Sciweavers

152 search results - page 18 / 31
» Anonymous k -Show Credentials
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
14 years 11 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 9 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy
97
Voted
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 1 days ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
COCOA
2008
Springer
14 years 11 months ago
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
A popular model for protecting privacy when person-specific data is released is k-anonymity. A dataset is k-anonymous if each record is identical to at least (k - 1) other records ...
Rhonda Chaytor, Patricia A. Evans, Todd Wareham
MOBICOM
2010
ACM
14 years 9 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...