Sciweavers

2601 search results - page 12 / 521
» Secure Rewarding Schemes
Sort
View
CSREASAM
2010
13 years 5 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
ETRICS
2006
13 years 11 months ago
Kleptographic Attacks on E-Voting Schemes
Marcin Gogolewski, Marek Klonowski, Przemyslaw Kub...
EUROPKI
2008
Springer
13 years 9 months ago
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
Chong Hee Kim, Philippe Bulens, Christophe Petit, ...
EUROCRYPT
2009
Springer
14 years 8 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup