-
1
-
-
84959049489
-
An efficient and practical scheme for privacy protection in the E-commerce of digital goods
-
Won, D. (ed.) ICISC 2000. Springer, Heidelberg
-
Bao, F., Deng, R.H., Feng, P.: An efficient and practical scheme for privacy protection in the E-commerce of digital goods. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 162-170. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2015
, pp. 162-170
-
-
Bao, F.1
Deng, R.H.2
Feng, P.3
-
3
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
4
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 136-145. IEEE, Los Alamitos (2002)
-
(2002)
42nd IEEE Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
5
-
-
24144485861
-
Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Chu, C., Tzeng, W.: Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172-183. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 172-183
-
-
Chu, C.1
Tzeng, W.2
-
6
-
-
70449671086
-
An efficient Buyer-Seller watermarking protocol based on composite signal representation
-
Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient Buyer-Seller watermarking protocol based on composite signal representation. In: ACM MM&Sec 2009, pp. 9-18 (2009)
-
(2009)
ACM MM&Sec 2009
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
8
-
-
80052985605
-
Worst case attack against binary probabilistic traitor tracing codes
-
Furon, T., Pérez-Freire, L.: Worst case attack against binary probabilistic traitor tracing codes. In: IEEE WIFS 2009, pp. 46-50 (2009)
-
(2009)
IEEE WIFS 2009
, pp. 46-50
-
-
Furon, T.1
Pérez-Freire, L.2
-
10
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
12
-
-
77952507577
-
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
-
Kuribayashi, M.: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol. EURASIP Journal on Inf. Security (2010)
-
(2010)
EURASIP Journal on Inf. Security
-
-
Kuribayashi, M.1
-
13
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In:Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 791. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 791
-
-
Naor, M.1
Pinkas, B.2
-
14
-
-
22044454088
-
Computationally secure oblivious transfer
-
Naor, M., Pinkas, B.: Computationally secure oblivious transfer. Journal of Cryptology 18(1), 1-35 (2005)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
70350374371
-
Authentic time-stamps for archival storage
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Oprea, A., Bowers, K.D.: Authentic time-stamps for archival storage. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 136-151. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 136-151
-
-
Oprea, A.1
Bowers, K.D.2
-
16
-
-
84947921515
-
Asymmetric fingerprinting
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84-95. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
17
-
-
0003462641
-
-
Tech. rep., Technical Report TR-81, Harvard Aiken Computation Laboratory
-
Rabin, M.: How to exchange secrets by oblivious transfer. Tech. rep., Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
18
-
-
38349016775
-
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
-
Skoric, B., Katzenbeisser, S., Celik, M.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography 46(2), 137-166 (2008)
-
(2008)
Designs, Codes and Cryptography
, vol.46
, Issue.2
, pp. 137-166
-
-
Skoric, B.1
Katzenbeisser, S.2
Celik, M.3
-
19
-
-
0038447029
-
Optimal probabilistic fingerprint codes
-
ACM, New York
-
Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116-125. ACM, New York (2003), http://www.renyi.hu/~tardos/publications.html
-
(2003)
STOC 2003
, pp. 116-125
-
-
Tardos, G.1
-
21
-
-
0142218971
-
Practical t-out-n oblivious transfer and its applications
-
Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. Springer, Heidelberg
-
Wu, Q., Zhang, J., Wang, Y.: Practical t-out-n oblivious transfer and its applications. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 226-237. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2836
, pp. 226-237
-
-
Wu, Q.1
Zhang, J.2
Wang, Y.3
-
22
-
-
35048900298
-
Cryptanalysis of a knapsack based two-lock cryptosystem
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
-
Zhang, B., Wu, H., Feng, D., Bao, F.: Cryptanalysis of a knapsack based two-lock cryptosystem. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 303-309. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 303-309
-
-
Zhang, B.1
Wu, H.2
Feng, D.3
Bao, F.4
|