Sciweavers

352 search results - page 26 / 71
» Cryptography in the Multi-string Model
Sort
View
ISW
2004
Springer
14 years 3 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
ACNS
2010
Springer
145views Cryptology» more  ACNS 2010»
14 years 1 months ago
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...
Xuhua Ding
CODASPY
2012
12 years 5 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
EUROCRYPT
2005
Springer
14 years 3 months ago
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding ...
Claude Crépeau, Daniel Gottesman, Adam Smit...