Sciweavers

1064 search results - page 109 / 213
» Cryptography from Anonymity
Sort
View
122
Voted
JSAI
2001
Springer
15 years 8 months ago
Public Opinion Channel: A System for Augmenting Social Intelligence of a Community
We propose a novel community communication system called Public Opinion Channel (POC). Existing communication systems have limitations on eliciting and circulating opinions from co...
Tomohiro Fukuhara, Toyoaki Nishida, Shunsuke Uemur...
116
Voted
TCC
2009
Springer
146views Cryptology» more  TCC 2009»
16 years 4 months ago
An Optimally Fair Coin Toss
We address one of the foundational problems in cryptography: the bias of coin-flipping protocols. Coin-flipping protocols allow mutually distrustful parties to generate a common u...
Tal Moran, Moni Naor, Gil Segev
ESORICS
2002
Springer
16 years 3 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
117
Voted
CSE
2009
IEEE
15 years 10 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
FSTTCS
2009
Springer
15 years 10 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...