×

Found 38 Documents (Results 1–38)

Efficient fully anonymous public-key trace and revoke with adaptive IND-CCA security. (English) Zbl 1504.94169

Deng, Robert (ed.) et al., Information security practice and experience. 16th international conference, ISPEC 2021, Nanjing, China, December 17–19, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13107, 168-189 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient identity-based outsider anonymous public-key trace and revoke with constant ciphertext-size and fast decryption. (English) Zbl 1500.94042

Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 365-380 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Mining personal banking data to detect fraud. (English) Zbl 1151.62081

Brito, Paula (ed.) et al., Selected contributions in data analysis and classification. In honour of Edwin Diday. With a foreword by Yves Escoufier. Berlin: Springer (ISBN 978-3-540-73558-8/pbk). Studies in Classification, Data Analysis, and Knowledge Organization, 377-386 (2007).
MSC:  62P05
PDF BibTeX XML Cite
Full Text: DOI

Formal definitions of fraud. (English) Zbl 0940.91050

McNamara, P. (ed.) et al., Norms, logics and information systems. New studies in deontic logic and computer science. Selected papers of the 4th \(\Delta\)EON workshop, Bologna, Italy, January 8-10, 1998. Amsterdam: IOS Press. Front. Artif. Intell. Appl. 49, 275-287 (1999).
MSC:  91B60 03B45 03B80
PDF BibTeX XML Cite

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software