Sciweavers

152 search results - page 11 / 31
» Anonymous k -Show Credentials
Sort
View
TKDE
2010
116views more  TKDE 2010»
14 years 8 months ago
k-Anonymity in the Presence of External Databases
Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris...
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
WPES
2003
ACM
15 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
WPES
2006
ACM
15 years 3 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang