Sciweavers

152 search results - page 6 / 31
» Anonymous k -Show Credentials
Sort
View
IEEEARES
2007
IEEE
15 years 3 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
ACSAC
2009
IEEE
15 years 4 months ago
A New Approach for Anonymous Password Authentication
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
15 years 11 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
ICDE
2006
IEEE
184views Database» more  ICDE 2006»
15 years 11 months ago
l-Diversity: Privacy Beyond k-Anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Ki...
GRID
2006
Springer
14 years 9 months ago
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service
Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Regis...
Ian T. Foster, Veronika Nefedova, Mehran Ahsant, R...