Sciweavers

2601 search results - page 371 / 521
» Secure Rewarding Schemes
Sort
View
128
Voted
CSFW
2005
IEEE
15 years 10 months ago
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when partial information...
Pedro Adão, Gergei Bana, Andre Scedrov
IQIS
2005
ACM
15 years 10 months ago
Blocking-aware private record linkage
In this paper, the problem of quickly matching records (i.e., record linkage problem) from two autonomous sources without revealing privacy to the other parties is considered. In ...
Ali Al-Lawati, Dongwon Lee, Patrick McDaniel
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
ICALP
2005
Springer
15 years 10 months ago
Hierarchical Group Signatures
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the si...
Mårten Trolin, Douglas Wikström
125
Voted
CCS
2004
ACM
15 years 10 months ago
Pong-cache poisoning in GUESS
This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coord...
Neil Daswani, Hector Garcia-Molina