Sciweavers

555 search results - page 26 / 111
» Anonymous Webs of Trust
Sort
View
ICDCS
2005
IEEE
15 years 3 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
70
Voted
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 1 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
ESORICS
2008
Springer
14 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
MIDDLEWARE
2010
Springer
14 years 8 months ago
The Gossple Anonymous Social Network
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to bui...
Marin Bertier, Davide Frey, Rachid Guerraoui, Anne...
170
Voted
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
15 years 11 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu