Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections (English)
- New search for: Kiayias, Aggelos
- New search for: Yung, Moti
- New search for: Kiayias, Aggelos
- New search for: Yung, Moti
In:
Financial Cryptography and Data Security
;
257-271
;
2010
- Article/Chapter (Book) / Electronic Resource
-
Title:Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
-
Contributors:Kiayias, Aggelos ( author ) / Yung, Moti ( author )
-
Published in:Financial Cryptography and Data Security ; 257-271Lecture Notes in Computer Science ; 6052 ; 257-271
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2010-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Constructive Cryptography – A PrimerMaurer, Ueli et al. | 2010
- 2
-
Security Mechanisms with Selfish Players in Wireless NetworksHubaux, Jean-Pierre et al. | 2010
- 3
-
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security LaboratoryCranor, Lorrie Faith et al. | 2010
- 4
-
Multichannel Protocols to Prevent Relay AttacksStajano, Frank / Wong, Ford-Long / Christianson, Bruce et al. | 2010
- 20
-
A Traceability Attack against e-PassportsChothia, Tom / Smirnov, Vitaliy et al. | 2010
- 35
-
Secure Computation with Fixed-Point NumbersCatrina, Octavian / Saxena, Amitabh et al. | 2010
- 51
-
Implementing a High-Assurance Smart-Card OSKarger, Paul A. / Toll, David C. / Palmer, Elaine R. / McIntosh, Suzanne K. / Weber, Samuel / Edwards, Jonathan W. et al. | 2010
- 66
-
Unlinkable Priced Oblivious Transfer with Rechargeable WalletsCamenisch, Jan / Dubovitskaya, Maria / Neven, Gregory et al. | 2010
- 82
-
Multiple Denominations in E-cash with Compact Transaction DataCanard, Sébastien / Gouget, Aline et al. | 2010
- 98
-
What’s in a Name?Bonneau, Joseph / Just, Mike / Matthews, Greg et al. | 2010
- 114
-
Cryptographic Protocol Analysis of AN.ONWestermann, Benedikt / Wendolsky, Rolf / Pimenidis, Lexi / Kesdogan, Dogan et al. | 2010
- 129
-
A CDH-Based Ring Signature Scheme with Short Signatures and Public KeysSchäge, Sven / Schwenk, Jörg et al. | 2010
- 143
-
Practical Private Set Intersection Protocols with Linear ComplexityCristofaro, Emiliano / Tsudik, Gene et al. | 2010
- 160
-
Design and Implementation of a Key-Lifecycle Management SystemBjörkqvist, Mathias / Cachin, Christian / Haas, Robert / Hu, Xiao-Yu / Kurmus, Anil / Pawlitzek, René / Vukolić, Marko et al. | 2010
- 175
-
Measuring the Perpetrators and Funders of TyposquattingMoore, Tyler / Edelman, Benjamin et al. | 2010
- 192
-
A Learning-Based Approach to Reactive SecurityBarth, Adam / Rubinstein, Benjamin I. P. / Sundararajan, Mukund / Mitchell, John C. / Song, Dawn / Bartlett, Peter L. et al. | 2010
- 207
-
Embedded SFE: Offloading Server and Network Using Hardware TokensJärvinen, Kimmo / Kolesnikov, Vladimir / Sadeghi, Ahmad-Reza / Schneider, Thomas et al. | 2010
- 222
-
The Phish-Market Protocol: Securely Sharing Attack Data between CompetitorsMoran, Tal / Moore, Tyler et al. | 2010
- 238
-
Building Incentives into TorDingledine, Roger / Wallach, Dan S. et al. | 2010
- 257
-
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot ElectionsKiayias, Aggelos / Yung, Moti et al. | 2010
- 272
-
Automatically Preparing Safe SQL QueriesBisht, Prithvi / Sistla, A. Prasad / Venkatakrishnan, V. N. et al. | 2010
- 289
-
PKI Layer Cake: New Collision Attacks against the Global X.509 InfrastructureKaminsky, Dan / Patterson, Meredith L. / Sassaman, Len et al. | 2010
- 304
-
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting SecrecyChen, Xiaofeng / Zhang, Fangguo / Tian, Haibo / Wu, Qianhong / Mu, Yi / Kim, Jangseong / Kim, Kwangjo et al. | 2010
- 312
-
Designing for Audit: A Voting Machine with a Tiny TCBGardner, Ryan W. / Garera, Sujata / Rubin, Aviel D. et al. | 2010
- 320
-
Attacking of SmartCard-Based Banking Applications with JavaScript-Based RootkitsBußmeyer, Daniel / Gröbert, Felix / Schwenk, Jörg / Wegener, Christoph et al. | 2010
- 328
-
Security Applications of Diodes with Unique Current-Voltage CharacteristicsRührmair, Ulrich / Jaeger, Christian / Hilgers, Christian / Algasinger, Michael / Csaba, György / Stutzmann, Martin et al. | 2010
- 336
-
Verified by Visa and MasterCard SecureCode: Or, How Not to Design AuthenticationMurdoch, Steven J. / Anderson, Ross et al. | 2010
- 343
-
All You Can Eat or Breaking a Real-World Contactless Payment SystemKasper, Timo / Silbermann, Michael / Paar, Christof et al. | 2010
- 351
-
Shoulder-Surfing Safe Login in a Partially Observable Attacker ModelPerković, Toni / Čagalj, Mario / Saxena, Nitesh et al. | 2010
- 359
-
Using Sphinx to Improve Onion Routing Circuit ConstructionKate, Aniket / Goldberg, Ian et al. | 2010
- 367
-
Secure Multiparty AESDamgård, Ivan / Keller, Marcel et al. | 2010
- 375
-
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical AnalysisGuajardo, Jorge / Mennink, Bart / Schoenmakers, Berry et al. | 2010
- 383
-
On Robust Key Agreement Based on Public Key AuthenticationHao, Feng et al. | 2010
- 391
-
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line GuessingGroza, Bogdan / Minea, Marius et al. | 2010
- 400
-
Signatures of ReputationBethencourt, John / Shi, Elaine / Song, Dawn et al. | 2010
- 408
-
Intention-Disguised Algorithmic TradingYuen, William / Syverson, Paul / Liu, Zhenming / Thorpe, Christopher et al. | 2010
- 416
-
When Information Improves Information SecurityGrossklags, Jens / Johnson, Benjamin / Christin, Nicolas et al. | 2010
- 424
-
BetterThanPin: Empowering Users to Fight Phishing (Poster)Tan, Teik Guan et al. | 2010
- 425
-
Certification Intermediaries and the Alternative (Poster)Chia, Pern Hui et al. | 2010
- 426
-
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge ProofsGrzonkowski, Sławomir et al. | 2010
- 427
-
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc NetworksCaballero-Gil, Pino / Molina-Gil, Jezabel / Caballero-Gil, Cándido / Hernández-Goya, Candelaria et al. | 2010
- 428
-
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic ProtocolsGeorgieva, Lilia et al. | 2010
- 429
-
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted ComputersLi, Shujun / Sadeghi, Ahmad-Reza / Schmitz, Roland et al. | 2010