Sciweavers

5 search results - page 1 / 1
» Fragile mixing
Sort
View
CCS
2004
ACM
13 years 10 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 4 months ago
SurePath: An Approach to Resilient Anonymous Routing
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
Yingwu Zhu, Yiming Hu
MM
2006
ACM
140views Multimedia» more  MM 2006»
13 years 10 months ago
Instant archaeologies: digital lenses to probe and to perforate the urban fabric
The paper discusses the digital artwork series Impossible Geographies, works that weave dynamic cartographies of invisible, fragile and hybrid spaces. Impossible Geographies 01: M...
Petra Gemeinboeck, Atau Tanaka, Andy Dong
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 5 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
CVIU
2007
174views more  CVIU 2007»
13 years 4 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...