Sciweavers

38 search results - page 3 / 8
» fc 2005
Sort
View
FC
2005
Springer
109views Cryptology» more  FC 2005»
14 years 29 days ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
FC
2005
Springer
88views Cryptology» more  FC 2005»
14 years 29 days ago
Small Coalitions Cannot Manipulate Voting
We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm i...
Edith Elkind, Helger Lipmaa
FC
2005
Springer
119views Cryptology» more  FC 2005»
14 years 29 days ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 29 days ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
FC
2005
Springer
80views Cryptology» more  FC 2005»
14 years 29 days ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos