Sciweavers

FC
1998
Springer
98views Cryptology» more  FC 1998»
14 years 3 months ago
Using a High-Performance, Programmable Secure Coprocessor
Sean W. Smith, Elaine R. Palmer, Steve Weingart
FC
1998
Springer
164views Cryptology» more  FC 1998»
14 years 3 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
FC
1998
Springer
134views Cryptology» more  FC 1998»
14 years 3 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
FC
1998
Springer
101views Cryptology» more  FC 1998»
14 years 3 months ago
Curbing Junk E-Mail via Secure Classification
Eran Gabber, Markus Jakobsson, Yossi Matias, Alain...
FC
1998
Springer
156views Cryptology» more  FC 1998»
14 years 3 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
FC
1998
Springer
112views Cryptology» more  FC 1998»
14 years 3 months ago
On Assurance Structures for WWW Commerce
Markus Jakobsson, Moti Yung
FC
1998
Springer
96views Cryptology» more  FC 1998»
14 years 3 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
FC
1998
Springer
121views Cryptology» more  FC 1998»
14 years 3 months ago
Cryptanalysis of SPEED
Abstract. The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography '97. This paper cryptanalyzes that proposal, in two parts: F...
Chris Hall, John Kelsey, Bruce Schneier, David Wag...
FC
1998
Springer
83views Cryptology» more  FC 1998»
14 years 3 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval