Sciweavers

446 search results - page 45 / 90
» On Anonymity of Group Signatures
Sort
View
CADE
2010
Springer
15 years 29 days ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
CHI
2007
ACM
16 years 7 days ago
Conversation votes: enabling anonymous cues
In this work we describe Conversation Votes, a visualization to create new backchannels in conversation and augment collocated interaction. We expand the idea of a social mirror, ...
Tony Bergstrom, Karrie Karahalios
INFOCOM
2010
IEEE
14 years 9 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
JNW
2006
63views more  JNW 2006»
14 years 11 months ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski
SSD
2007
Springer
155views Database» more  SSD 2007»
15 years 6 months ago
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries
Abstract. Modern mobile phones and PDAs are equipped with positioning capabilities (e.g., GPS). Users can access public location-based services (e.g., Google Maps) and ask spatial ...
Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos