Sciweavers

152 search results - page 13 / 31
» Anonymous k -Show Credentials
Sort
View
TISSEC
1998
42views more  TISSEC 1998»
14 years 9 months ago
Crowds: Anonymity for Web Transactions
Michael K. Reiter, Aviel D. Rubin
60
Voted
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
15 years 3 months ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...
TISSEC
2008
45views more  TISSEC 2008»
14 years 9 months ago
Passive-Logging Attacks Against Anonymous Communications Systems
Matthew K. Wright, Micah Adler, Brian Neil Levine,...
DBSEC
1998
115views Database» more  DBSEC 1998»
14 years 11 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
PERCOM
2010
ACM
14 years 7 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis