Sciweavers

169 search results - page 8 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
INFOCOM
2007
IEEE
15 years 6 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...
IMTCI
2004
Springer
15 years 5 months ago
Mobile Agents: Preserving Privacy and Anonymity
The paper presents two new methods for providing mobile agents with privacy and anynomity. The proposed schemes are based on different cryptographic primitives: a secret-sharing s...
Aneta Zwierko, Zbigniew Kotulski
ISECS
2008
IEEE
15 years 6 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
WISA
2009
Springer
15 years 6 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
16 years 7 days ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente