Sciweavers

24 search results - page 4 / 5
» fc 2008
Sort
View
FC
2008
Springer
97views Cryptology» more  FC 2008»
14 years 19 days ago
OpenPGP-Based Financial Instruments and Dispute Arbitration
In this paper, we present some guidelines for implementing various financial instruments for the purposes of credit and payment, including protocols for commercial transactions, di...
Daniel A. Nagy, Nadzeya V. Shakel
FC
2008
Springer
133views Cryptology» more  FC 2008»
14 years 19 days ago
A Proof of Concept Attack against Norwegian Internet Banking Systems
Abstract. The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nation...
Yngve Espelid, Lars-Helge Netland, André N....
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 19 days ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
FC
2008
Springer
82views Cryptology» more  FC 2008»
14 years 19 days ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
FC
2008
Springer
107views Cryptology» more  FC 2008»
14 years 19 days ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton