Sciweavers

1064 search results - page 24 / 213
» Cryptography from Anonymity
Sort
View
130
Voted
IPPS
2007
IEEE
15 years 8 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
112
Voted
CSREASAM
2006
15 years 3 months ago
An ID-based Anonymous Proxy Signature From Bilinear Pairings
Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu
DI
2010
62views more  DI 2010»
15 years 1 months ago
Mining writeprints from anonymous e-mails for forensic investigation
Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. F...
126
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 1 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
154
Voted
ICC
2009
IEEE
171views Communications» more  ICC 2009»
14 years 11 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno