Homomorphic Signatures for Digital Photographs (English)
- New search for: Johnson, R.
- New search for: Walsh, L.
- New search for: Lamb, M.
- New search for: Johnson, R.
- New search for: Walsh, L.
- New search for: Lamb, M.
- New search for: Danezis, George
In:
Financial cryptography and data security
7035
;
141-157
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Homomorphic Signatures for Digital Photographs
-
Contributors:
-
Conference:International conference; 15th, Financial cryptography and data security ; 2011 ; Gros Islet, St. Lucia
-
Published in:Financial cryptography and data security , 7035 ; 141-157LECTURE NOTES IN COMPUTER SCIENCE , 7035 ; 141-157
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2012-01-01
-
Size:17 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal DataBohme, R. / Potzsch, S. et al. | 2012
- 16
-
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security AdviceChristin, N. / Egelman, S. / Vidas, T. / Grossklags, J. et al. | 2012
- 31
-
Evaluating the Privacy Risk of Location-Based ServicesFreudiger, J. / Shokri, R. / Hubaux, J.-P. et al. | 2012
- 47
-
Selections: Internet Voting with Over-the-Shoulder Coercion-ResistanceClark, J. / Hengartner, U. et al. | 2012
- 62
-
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity ProtectionWestermann, B. / Kesdogan, D. et al. | 2012
- 77
-
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration ToolsNovak, J. / Stribley, J. / Meagher, K. / Halderman, J.A. et al. | 2012
- 85
-
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)Palmer, B. / Bubendorfer, K. / Welch, I. et al. | 2012
- 93
-
Impeding Individual User Profiling in Shopper Loyalty ProgramsMarquardt, P. / Dagon, D. / Traynor, P. et al. | 2012
- 102
-
Beyond Risk-Based Access Control: Towards Incentive-Based Access ControlLiu, D. / Li, N. / Wang, X. / Camp, L.J. et al. | 2012
- 113
-
Authenticated Key Exchange under Bad RandomnessYang, G. / Duan, S. / Wong, D.S. / Tan, C.H. / Wang, H. et al. | 2012
- 127
-
Oblivious Outsourced Storage with DelegationFranz, M. / Williams, P. / Carbunar, B. / Katzenbeisser, S. / Peter, A. / Sion, R. / Sotakova, M. et al. | 2012
- 141
-
Homomorphic Signatures for Digital PhotographsJohnson, R. / Walsh, L. / Lamb, M. et al. | 2012
- 158
-
Revisiting the Computational Practicality of Private Information RetrievalOlumofin, F. / Goldberg, I. et al. | 2012
- 173
-
Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)Tuhin, M.A.A. / Safavi-Naini, R. et al. | 2012
- 182
-
A New Approach towards Coercion-Resistant Remote E-Voting in Linear TimeSpycher, O. / Koenig, R. / Haenni, R. / Schlapfer, M. et al. | 2012
- 190
-
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFsRuhrmair, U. / Jaeger, C. / Algasinger, M. et al. | 2012
- 205
-
Peeling Away Layers of an RFID Security SystemPlotz, H. / Nohl, K. et al. | 2012
- 220
-
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMVAnderson, R. / Bond, M. / Choudary, O. / Murdoch, S.J. / Stajano, F. et al. | 2012
- 235
-
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted ComputersLi, S. / Sadeghi, A.-R. / Heisrath, S. / Schmitz, R. / Ahmad, J.J. et al. | 2012
- 250
-
Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)Soghoian, C. / Stamm, S. et al. | 2012
- 260
-
Proximax: Measurement-Driven Proxy Dissemination (Short Paper)McCoy, D. / Morales, J.A. / Levchenko, K. et al. | 2012
- 268
-
BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)Lofgren, P. / Hopper, N. et al. | 2012
- 276
-
Towards Secure Bioinformatics Services (Short Paper)Franz, M. / Deiseroth, B. / Hamacher, K. / Jha, S. / Katzenbeisser, S. / Schroder, H. et al. | 2012
- 284
-
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web ApplicationsScholte, T. / Balzarotti, D. / Kirda, E. et al. | 2012
- 299
-
Re-evaluating the Wisdom of Crowds in Assessing Web SecurityChia, P.H. / Knapskog, S.J. et al. | 2012
- 315
-
Mercury: Recovering Forgotten Passwords Using Personal DevicesMannan, M. / Barrera, D. / Brown, C.D. / Lie, D. / van Oorschot, P.C. et al. | 2012