Sciweavers

651 search results - page 94 / 131
» Security of Electronic Money
Sort
View
WPES
2004
ACM
14 years 2 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
CCS
2004
ACM
14 years 2 months ago
Parallel mixing
Efforts to design faster synchronous mix networks have focused on reducing the computational cost of mixing per server. We propose a different approach: our re-encryption mixnet...
Philippe Golle, Ari Juels
ICICS
2004
Springer
14 years 2 months ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
EUROCRYPT
1997
Springer
14 years 1 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
CCS
2004
ACM
14 years 17 days ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger