Sciweavers

38 search results - page 5 / 8
» fc 2005
Sort
View
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 29 days ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
FC
2005
Springer
83views Cryptology» more  FC 2005»
14 years 29 days ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 29 days ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
FC
2005
Springer
104views Cryptology» more  FC 2005»
14 years 29 days ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
FC
2005
Springer
171views Cryptology» more  FC 2005»
14 years 29 days ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu