Sciweavers

298 search results - page 47 / 60
» Strong Anonymous Signatures
Sort
View
SAINT
2008
IEEE
14 years 1 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
13 years 11 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf
FC
2010
Springer
230views Cryptology» more  FC 2010»
13 years 11 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
WCNC
2008
IEEE
14 years 1 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
IEEEARES
2007
IEEE
14 years 1 months ago
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, indiv...
Orhan Cetinkaya, Ali Doganaksoy