Sciweavers

99 search results - page 20 / 20
» An Efficient Anonymous Credential System
Sort
View
BTW
2003
Springer
103views Database» more  BTW 2003»
15 years 3 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
MOBISYS
2008
ACM
15 years 9 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
ATAL
2010
Springer
14 years 11 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
JOC
2000
181views more  JOC 2000»
14 years 10 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern