Sciweavers

1064 search results - page 153 / 213
» Cryptography from Anonymity
Sort
View
ACNS
2009
Springer
152views Cryptology» more  ACNS 2009»
14 years 3 months ago
Homomorphic MACs: MAC-Based Integrity for Network Coding
Abstract. Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be c...
Shweta Agrawal, Dan Boneh
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 3 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
FC
2009
Springer
109views Cryptology» more  FC 2009»
14 years 3 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 3 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 3 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002