Sciweavers

759 search results - page 1 / 152
» What Can Be Implemented Anonymously
Sort
View
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
13 years 10 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
CISSE
2008
Springer
13 years 6 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
IH
1999
Springer
13 years 9 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
CCS
1998
ACM
13 years 9 months ago
The Design, Implementation and Operation of an Email Pseudonym Server
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
David Mazières, M. Frans Kaashoek
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
13 years 10 months ago
Fairness in Wallets with Observer
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
Heike Neumann, Thomas Schwarzpaul