Sciweavers

2601 search results - page 267 / 521
» Secure Rewarding Schemes
Sort
View
129
Voted
SDMW
2005
Springer
15 years 9 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
BIOSIG
2008
84views Biometrics» more  BIOSIG 2008»
15 years 5 months ago
eVoting with the European Citizen Card
: As many European countries are about to introduce national ID cards, which are compliant to the European Citizen Card specification prCEN 15480 it is natural to study how those c...
Gisela Meister, Detlef Hühnlein, Jan Eichholz...
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 3 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
CORR
2010
Springer
87views Education» more  CORR 2010»
15 years 2 months ago
Quantum money from knots
Quantum money is a cryptographic protocol in which a mint can produce a quantum state, no one else can copy the state, and anyone (with a quantum computer) can verify that the sta...
Edward Farhi, David Gosset, Avinatan Hassidim, And...
139
Voted
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
15 years 10 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß