Sciweavers

1064 search results - page 9 / 213
» Cryptography from Anonymity
Sort
View
AINA
2011
IEEE
14 years 5 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
110
Voted
ICIW
2008
IEEE
15 years 8 months ago
On Secure and Anonymous Buyer-Seller Watermarking Protocol
—Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer b...
Mina Deng, Bart Preneel
PET
2007
Springer
15 years 7 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
127
Voted
INFOCOM
2010
IEEE
15 years 6 days ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
CSFW
2010
IEEE
15 years 5 months ago
Robustness Guarantees for Anonymity
—Anonymous communication protocols must achieve two seemingly contradictory goals: privacy (informally, they must guarantee the anonymity of the parties that send/receive informa...
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tama...