Sciweavers

212 search results - page 12 / 43
» Anonymity and k-Choice Identities
Sort
View
TON
2012
13 years 2 days ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
INFOCOM
1995
IEEE
15 years 1 months ago
The Use of Communications Networks to Increase Personal Privacy
CommunicationsNetworks can separate as well asjoin iMormation. This ability can be used to increase personal privacy in an environment where advances in technology makes it possib...
Nicholas F. Maxemchuk, Steven H. Low
80
Voted
SIGOPSE
2004
ACM
15 years 3 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
69
Voted
CORR
2010
Springer
101views Education» more  CORR 2010»
14 years 9 months ago
Distributed anonymous discrete function computation
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage c...
Julien M. Hendrickx, Alexander Olshevsky, John N. ...
SIROCCO
1998
14 years 11 months ago
Time and Bit Optimal Broadcasting on Anonymous Unoriented Hypercubes
We consider broadcasting on asynchronous anonymous totally unoriented Nnode hypercubes. First we generalize a technique, introduced in 3 , for partial broadcasting and orientation...
Stefan Dobrev, Peter Ruzicka, Gerard Tel