Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes (English)
- New search for: McCarthy, A.
- New search for: Smyth, B.
- New search for: Quaglia, E.A.
- New search for: McCarthy, A.
- New search for: Smyth, B.
- New search for: Quaglia, E.A.
- New search for: Christin, Nicholas
- New search for: Safavi-Naini, Reihanah
In:
Financial cryptography and data security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, revised selected papers /
8437
;
51-63
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes
-
Contributors:McCarthy, A. ( author ) / Smyth, B. ( author ) / Quaglia, E.A. ( author ) / Christin, Nicholas / Safavi-Naini, Reihanah
-
Conference:International conference; 18th, Financial cryptography and data security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, revised selected papers / ; 2014 ; Christ Church, Barbados
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 8437 ; 51-63
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2014-01-01
-
Size:13 pages
-
Remarks:Based on those presented at the conference. "ISSN 1611-3349 (electronic)" --Title page verso. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Digital Check Forgery Attacks on Client Check Truncation SystemsGjomemo, R. / Malik, H. / Sumb, N. / Venkatakrishnan, V.N. / Ansari, R. et al. | 2014
- 21
-
Security Protocols and Evidence: Where Many Payment Systems FailMurdoch, S.J. / Anderson, R. et al. | 2014
- 33
-
The Ghosts of Banking Past: Empirical Analysis of Closed Bank WebsitesMoore, T. / Clayton, R. et al. | 2014
- 51
-
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting SchemesMcCarthy, A. / Smyth, B. / Quaglia, E.A. et al. | 2014
- 64
-
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing MessagesRoesner, F. / Gill, B.T. / Kohno, T. et al. | 2014
- 77
-
On the Awareness, Control and Privacy of Shared Photo MetadataHenne, B. / Koch, M. / Smith, M. et al. | 2014
- 89
-
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing SecurityMigicovsky, A. / Durumeric, Z. / Ringenberg, J. / Halderman, J.A. et al. | 2014
- 99
-
A Secure Data Deduplication Scheme for Cloud StorageStanek, J. / Sorniotti, A. / Androulaki, E. / Kencl, L. et al. | 2014
- 119
-
Confidentiality Issues on a GPU in a Virtualized EnvironmentMaurice, C. / Neumann, C. / Heen, O. / Francillon, A. et al. | 2014
- 139
-
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsTibouchi, M. et al. | 2014
- 157
-
Elliptic Curve Cryptography in PracticeBos, J.W. / Halderman, J.A. / Heninger, N. / Moore, J. / Naehrig, M. / Wustrow, E. et al. | 2014
- 179
-
Practical Secure Decision Tree Learning in a Teletreatment Applicationde Hoogh, S. / Schoenmakers, B. / Chen, P. / Akker, H.o.d. et al. | 2014
- 195
-
Scaling Private Set Intersection to Billion-Element SetsKamara, S. / Mohassel, P. / Raykova, M. / Sadeghian, S. et al. | 2014
- 216
-
Efficient Non-Interactive Zero Knowledge Arguments for Set OperationsFauzi, P. / Lipmaa, H. / Zhang, B. et al. | 2014
- 234
-
Garbled Searchable Symmetric EncryptionKurosawa, K. et al. | 2014
- 255
-
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID DocumentsBringer, J. / Chabanne, H. / Lescuyer, R. / Patey, A. et al. | 2014
- 273
-
A Short Paper on How to Improve U-Prove Using Self-Blindable CertificatesHanzlik, L. / Kluczniak, K. et al. | 2014
- 283
-
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked UsersHanzlik, L. / Kluczniak, K. / Kutylowski, M. et al. | 2014
- 291
-
Sample or Random Security - A Security Model for Segment-Based Visual CryptographyPape, S. et al. | 2014
- 307
-
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust StoresPerl, H. / Fahl, S. / Smith, M. et al. | 2014
- 316
-
Challenges in Protecting Tor Hidden Services from Botnet AbuseHopper, N. et al. | 2014
- 326
-
Identifying Risk Factors for Webserver CompromiseVasek, M. / Moore, T. et al. | 2014
- 349
-
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensingShrestha, B. / Saxena, N. / Truong, H.T.T. / Asokan, N. et al. | 2014
- 365
-
On the (In)Security of Mobile Two-Factor AuthenticationDmitrienko, A. / Liebchen, C. / Rossow, C. / Sadeghi, A.-R. et al. | 2014
- 384
-
MoP-2-MoP - Mobile Private MicrobloggingSenftleben, M. / Bucicoiu, M. / Tews, E. / Armknecht, F. / Katzenbeisser, S. / Sadeghi, A.-R. et al. | 2014
- 399
-
Privacy Preserving Tatonnement: A Cryptographic Construction of an Incentive Compatible MarketWallrabenstein, J.R. / Clifton, C. et al. | 2014
- 399
-
Privacy Preserving Tâtonnement. A Cryptographic Construction of an Incentive Compatible MarketWallrabenstein, John Ross / Clifton, Chris et al. | 2014
- 417
-
Estimating Systematic Risk in Real-World NetworksLaszka, A. / Johnson, B. / Grossklags, J. / Felegyhazi, M. et al. | 2014
- 436
-
Majority Is Not Enough: Bitcoin Mining Is VulnerableEyal, I. / Sirer, E.G. et al. | 2014
- 457
-
BitIodine: Extracting Intelligence from the Bitcoin NetworkSpagnuolo, M. / Maggi, F. / Zanero, S. et al. | 2014
- 469
-
An Analysis of Anonymity in Bitcoin Using P2P Network TrafficKoshy, P. / Koshy, D. / McDaniel, P. et al. | 2014
- 486
-
Mixcoin: Anonymity for Bitcoin with Accountable MixesBonneau, J. / Narayanan, A. / Miller, A. / Clark, J. / Kroll, J.A. / Felten, E.W. et al. | 2014