Sciweavers

2601 search results - page 328 / 521
» Secure Rewarding Schemes
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 10 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
15 years 10 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
SISW
2003
IEEE
15 years 9 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor
IJNSEC
2006
82views more  IJNSEC 2006»
15 years 4 months ago
A Study of Micro-payment Based on One-way Hash Chain
Electronic payment systems have gradually become an important issue nowadays because of the popularity and importance of electronic commerce on the Internet. Security and convenie...
Min-Shiang Hwang, Pei-Chen Sung