Sciweavers

5891 search results - page 202 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
145
Voted
PODC
2003
ACM
15 years 10 months ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh
ACSC
2003
IEEE
15 years 10 months ago
A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors
Intention preservation is an important aspect of consistency maintenance in real-time collaborative editing systems. The multi-version approach is able to preserve individual user...
Liyin Xue, Mehmet A. Orgun, Kang Zhang
CSI
2007
91views more  CSI 2007»
15 years 4 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
ICDCS
2010
IEEE
15 years 8 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
EUROCRYPT
2005
Springer
15 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...