Sciweavers

480 search results - page 13 / 96
» Anonymous Transactions in Computer Networks
Sort
View
124
Voted
CCS
2009
ACM
15 years 7 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
90
Voted
CCS
2009
ACM
15 years 7 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
PET
2007
Springer
15 years 6 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
63
Voted
ECOOPW
1999
Springer
15 years 4 months ago
Type-Safe Execution of Mobile Agents in Anonymous Networks
Matthew Hennessy, James Riely
122
Voted
AINA
2006
IEEE
15 years 4 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel