Sciweavers

299 search results - page 3 / 60
» Deniable Authentication on the Internet
Sort
View
CCS
2005
ACM
13 years 10 months ago
New approaches for deniable authentication
Mario Di Raimondo, Rosario Gennaro
NETWORKS
2006
13 years 5 months ago
An improved deniable authentication protocol
Jun Shao, Zhenfu Cao, Rongxing Lu
BIRTHDAY
2012
Springer
12 years 1 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
ECIR
2011
Springer
12 years 8 months ago
Enhancing Deniability against Query-Logs
We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search resu...
Avi Arampatzis, Pavlos Efraimidis, George Drosatos
CCS
2011
ACM
12 years 5 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...