Sciweavers

71 search results - page 3 / 15
» Anonymity in Probabilistic and Nondeterministic Systems
Sort
View
101
Voted
JCST
2008
98views more  JCST 2008»
14 years 11 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
CDC
2010
IEEE
107views Control Systems» more  CDC 2010»
14 years 6 months ago
Probabilistic mutual localization in multi-agent systems from anonymous position measures
Abstract-- Recent research on multi-agent systems has produced a plethora of decentralized controllers that implicitly assume various degrees of agent localization. However, many p...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
CCS
2010
ACM
14 years 12 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
103
Voted
CSFW
2002
IEEE
15 years 4 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
77
Voted
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
15 years 6 months ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...