Sciweavers

71 search results - page 3 / 15
» Anonymity in Probabilistic and Nondeterministic Systems
Sort
View
JCST
2008
98views more  JCST 2008»
13 years 5 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
CDC
2010
IEEE
107views Control Systems» more  CDC 2010»
13 years 17 days ago
Probabilistic mutual localization in multi-agent systems from anonymous position measures
Abstract-- Recent research on multi-agent systems has produced a plethora of decentralized controllers that implicitly assume various degrees of agent localization. However, many p...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
CCS
2010
ACM
13 years 5 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CSFW
2002
IEEE
13 years 10 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
14 years 16 days ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...