Sciweavers

14824 search results - page 2501 / 2965
» Security - Introduction
Sort
View
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
DRM
2009
Springer
15 years 11 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 11 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
ICISS
2009
Springer
15 years 11 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
« Prev « First page 2501 / 2965 Last » Next »