146
Voted
PET
15 years 8 months ago
2005 Springer
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
119
click to vote
PET
15 years 8 months ago
2005 Springer
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
116
click to vote
PET
15 years 8 months ago
2005 Springer
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
150
Voted
PET
15 years 8 months ago
2005 Springer
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
118
click to vote
PET
15 years 8 months ago
2005 Springer
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
|