Sciweavers

45 search results - page 3 / 9
» fc 2010
Sort
View
FC
2010
Springer
209views Cryptology» more  FC 2010»
15 years 1 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...
CCCG
2010
14 years 10 months ago
Range aggregate structures for colored geometric objects
A set of n colored objects (points/hyperboxes) lie in IRd . Each object has a weight associated with it. Given a query orthogonal range q, for each distinct color c of the objects...
Saladi Rahul, Haritha Bellam, Prosenjit Gupta, Kri...
FC
2010
Springer
158views Cryptology» more  FC 2010»
14 years 9 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
FC
2010
Springer
175views Cryptology» more  FC 2010»
14 years 10 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
FC
2010
Springer
157views Cryptology» more  FC 2010»
14 years 10 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan