Sciweavers

FC
2005
Springer
142views Cryptology» more  FC 2005»
14 years 5 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 5 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 5 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 5 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 5 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 5 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
FC
2005
Springer
92views Cryptology» more  FC 2005»
14 years 5 months ago
A Chat at the Old Phishin' Hole
Richard Clayton, Drew Dean, Markus Jakobsson, Stev...
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 5 months ago
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
We surveyed 470 Amazon.com merchants regarding their experience, knowledge and perceptions of digitally-signed email. Some of these merchants (93) had been receiving digitally-sign...
Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nor...
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 5 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
FC
2005
Springer
94views Cryptology» more  FC 2005»
14 years 5 months ago
Modeling and Preventing Phishing Attacks
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Markus Jakobsson