Sciweavers

10 search results - page 2 / 2
» The SPARTA Pseudonym and Authorization System
Sort
View
CSCW
2012
ACM
12 years 13 days ago
Boundary regulation in social media
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
Stutzman Frederic, Hartzog Woodrow
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 6 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
13 years 11 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
PODC
2005
ACM
13 years 10 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
TPDS
2008
116views more  TPDS 2008»
13 years 4 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...