Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections (English)
- New search for: Kiayias, A.
- New search for: Yung, M.
- New search for: Kiayias, A.
- New search for: Yung, M.
- New search for: Sion, Radu
In:
Financial cryptography and data security: 14th international conference, FC 2010
6052
;
257-271
;
2010
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
-
Contributors:
-
Conference:Conference; 14th, Financial cryptography and data security: 14th international conference, FC 2010 ; 2010 ; Tenerife
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 6052 ; 257-271
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2010-01-01
-
Size:15 pages
-
Remarks:Based on those presented at the conference. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Constructive Cryptography - A PrimerMaurer, U. et al. | 2010
- 2
-
Security Mechanisms with Selfish Players in Wireless NetworksHubaux, J.-P. et al. | 2010
- 3
-
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security LaboratoryCranor, L.F. et al. | 2010
- 4
-
Multichannel Protocols to Prevent Relay AttacksStajano, F. / Wong, F.-L. / Christianson, B. et al. | 2010
- 20
-
A Traceability Attack against e-PassportsChothia, T. / Smirnov, V. et al. | 2010
- 35
-
Secure Computation with Fixed-Point NumbersCatrina, O. / Saxena, A. et al. | 2010
- 51
-
Implementing a High-Assurance Smart-Card OSKarger, P.A. / Toll, D.C. / Palmer, E.R. / McIntosh, S.K. / Weber, S. / Edwards, J.W. et al. | 2010
- 66
-
Unlinkable Priced Oblivious Transfer with Rechargeable WalletsCamenisch, J. / Dubovitskaya, M. / Neven, G. et al. | 2010
- 82
-
Multiple Denominations in E-cash with Compact Transaction DataCanard, S. / Gouget, A. et al. | 2010
- 98
-
What's in a Name? Evaluating Statistical Attacks on Personal Knowledge QuestionsBonneau, J. / Just, M. / Matthews, G. et al. | 2010
- 114
-
Cryptographic Protocol Analysis of AN.ONWestermann, B. / Wendolsky, R. / Pimenidis, L. / Kesdogan, D. et al. | 2010
- 129
-
A CDH-Based Ring Signature Scheme with Short Signatures and Public KeysSchage, S. / Schwenk, J. et al. | 2010
- 143
-
Practical Private Set Intersection Protocols with Linear ComplexityDe Cristofaro, E. / Tsudik, G. et al. | 2010
- 160
-
Design and Implementation of a Key-Lifecycle Management SystemBjorkqvist, M. / Cachin, C. / Haas, R. / Hu, X.-Y. / Kurmus, A. / Pawlitzek, R. / Vukolic, M. et al. | 2010
- 175
-
Measuring the Perpetrators and Funders of TyposquattingMoore, T. / Edelman, B. et al. | 2010
- 192
-
A Learning-Based Approach to Reactive SecurityBarth, A. / Rubinstein, B.I.P. / Sundararajan, M. / Mitchell, J.C. / Song, D. / Bartlett, P.L. et al. | 2010
- 207
-
Embedded SFE: Offloading Server and Network Using Hardware TokensJarvinen, K. / Kolesnikov, V. / Sadeghi, A.-R. / Schneider, T. et al. | 2010
- 222
-
The Phish-Market Protocol: Securely Sharing Attack Data between CompetitorsMoran, T. / Moore, T. et al. | 2010
- 238
-
Building Incentives into TorNgan, T.-W. / Dingledine, R. / Wallach, D.S. et al. | 2010
- 257
-
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot ElectionsKiayias, A. / Yung, M. et al. | 2010
- 272
-
Automatically Preparing Safe SQL QueriesBisht, P. / Sistla, A.P. / Venkatakrishnan, V.N. et al. | 2010
- 289
-
PKI Layer Cake: New Collision Attacks against the Global X.509 InfrastructureKaminsky, D. / Patterson, M.L. / Sassaman, L. et al. | 2010
- 304
-
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting SecrecyChen, X. / Zhang, F. / Tian, H. / Wu, Q. / Mu, Y. / Kim, J. / Kim, K. et al. | 2010
- 312
-
Designing for Audit: A Voting Machine with a Tiny TCBGardner, R.W. / Garera, S. / Rubin, A.D. et al. | 2010
- 320
-
Attacking of SmartCard-Based Banking Applications with JavaScript-Based RootkitsBussmeyer, D. / Grobert, F. / Schwenk, J. / Wegener, C. et al. | 2010
- 328
-
Security Applications of Diodes with Unique Current-Voltage CharacteristicsRuhrmair, U. / Jaeger, C. / Hilgers, C. / Algasinger, M. / Csaba, G. / Stutzmann, M. et al. | 2010
- 336
-
Verified by Visa and MasterCard SecureCode: or, How Not to Design AuthenticationMurdoch, S.J. / Anderson, R. et al. | 2010
- 343
-
All You Can Eat or Breaking a Real-World Contactless Payment SystemKasper, T. / Silbermann, M. / Paar, C. et al. | 2010
- 351
-
Shoulder-Surfing Safe Login in a Partially Observable Attacker ModelPerkovic, T. / Cagalj, M. / Saxena, N. et al. | 2010
- 359
-
Using Sphinx to Improve Onion Routing Circuit ConstructionKate, A. / Goldberg, I. et al. | 2010
- 367
-
Secure Multiparty AESDamgard, I. / Keller, M. et al. | 2010
- 375
-
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical AnalysisGuajardo, J. / Mennink, B. / Schoenmakers, B. et al. | 2010
- 383
-
On Robust Key Agreement Based on Public Key AuthenticationHao, F. et al. | 2010
- 391
-
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line GuessingGroza, B. / Minea, M. et al. | 2010
- 400
-
Signatures of ReputationBethencourt, J. / Shi, E. / Song, D. et al. | 2010
- 408
-
Intention-Disguised Algorithmic TradingYuen, W. / Syverson, P. / Liu, Z. / Thorpe, C. et al. | 2010
- 416
-
When Information Improves Information SecurityGrossklags, J. / Johnson, B. / Christin, N. et al. | 2010
- 424
-
BetterThanPin: Empowering Users to Fight PhishingTan, T.G. et al. | 2010
- 425
-
Certification Intermediaries and the AlternativeChia, P.H. et al. | 2010
- 426
-
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge ProofsGrzonkowski, S. et al. | 2010
- 427
-
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc NetworksCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. / Hernandez-Goya, C. et al. | 2010
- 428
-
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic ProtocolsGeorgieva, L. et al. | 2010
- 429
-
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted ComputersLi, S. / Sadeghi, A.-R. / Schmitz, R. et al. | 2010