Sciweavers

480 search results - page 1 / 96
» Anonymous Transactions in Computer Networks
Sort
View
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
13 years 11 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
DIS
2004
Springer
13 years 10 months ago
Privacy Problems with Anonymized Transaction Databases
In this paper we consider privacy problems with anonymized transaction databases, i.e., transaction databases where the items are renamed in order to hide sensitive information. In...
Taneli Mielikäinen
PERCOM
2005
ACM
14 years 4 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
CORR
2006
Springer
78views Education» more  CORR 2006»
13 years 4 months ago
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and ...
Adam J. Slagell, Kiran Lakkaraju, Katherine Luo
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
13 years 9 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer