Sciweavers

299 search results - page 3 / 60
» Deniable Authentication on the Internet
Sort
View
CCS
2005
ACM
15 years 5 months ago
New approaches for deniable authentication
Mario Di Raimondo, Rosario Gennaro
NETWORKS
2006
14 years 11 months ago
An improved deniable authentication protocol
Jun Shao, Zhenfu Cao, Rongxing Lu
BIRTHDAY
2012
Springer
13 years 7 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
ECIR
2011
Springer
14 years 3 months ago
Enhancing Deniability against Query-Logs
We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search resu...
Avi Arampatzis, Pavlos Efraimidis, George Drosatos
CCS
2011
ACM
13 years 11 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...