Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
AINA
2011
IEEE
11 years 5 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
TDSC
2011
11 years 9 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
TDSC
2011
11 years 9 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
WOTE
2010
11 years 11 months ago
Anonymity in Voting Revisited
According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been id...
Hugo Jonker, Wolter Pieters
GLOBECOM
2010
IEEE
11 years 12 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...
SIGKDD
2010
159views more  SIGKDD 2010»
12 years 10 days ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
MIDDLEWARE
2010
Springer
12 years 11 days ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
INFOCOM
2010
IEEE
12 years 12 days ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
CORR
2010
Springer
82views Education» more  CORR 2010»
12 years 1 months ago
Accountable Anonymous Group Messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
CLUSTER
2007
IEEE
12 years 1 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi
books