Sciweavers

57 search results - page 7 / 12
» Anonymous Services using Smart Cards and Cryptography
Sort
View
IJIEM
2007
113views more  IJIEM 2007»
13 years 7 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 1 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 6 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström