Sciweavers

152 search results - page 5 / 31
» Anonymous k -Show Credentials
Sort
View
FC
2008
Springer
96views Cryptology» more  FC 2008»
14 years 10 months ago
An Efficient Anonymous Credential System
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
WPES
2004
ACM
15 years 3 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
CMS
2006
116views Communications» more  CMS 2006»
14 years 11 months ago
A Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more pri...
Vincent Naessens, Liesje Demuynck, Bart De Decker
FC
2007
Springer
118views Cryptology» more  FC 2007»
15 years 3 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
15 years 11 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...