Sciweavers

11 search results - page 2 / 3
» fc 1998
Sort
View
FC
1998
Springer
156views Cryptology» more  FC 1998»
14 years 3 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
FC
1998
Springer
83views Cryptology» more  FC 1998»
14 years 3 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
FC
1998
Springer
164views Cryptology» more  FC 1998»
14 years 3 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
VVS
1998
IEEE
115views Visualization» more  VVS 1998»
14 years 3 months ago
Extracting ISO-Valued Features in 4-Dimensional Scalar Fields
Isosurfaces are an important tool for finding features in 3D scalar data. This paper describes how recursive contour meshing is applied to extract similar features in 4-dimensiona...
Chris Weigle, David C. Banks
FC
1998
Springer
96views Cryptology» more  FC 1998»
14 years 3 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss