Sciweavers

FC
2005
Springer
119views Cryptology» more  FC 2005»
14 years 4 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 4 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
FC
2005
Springer
109views Cryptology» more  FC 2005»
14 years 4 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
FC
2005
Springer
104views Cryptology» more  FC 2005»
14 years 4 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
FC
2005
Springer
93views Cryptology» more  FC 2005»
14 years 4 months ago
Audit File Reduction Using N-Gram Models
Fernando Godínez, Dieter Hutter, Raul Monro...
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 4 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
FC
2005
Springer
83views Cryptology» more  FC 2005»
14 years 4 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...