Sciweavers

49 search results - page 5 / 10
» Pseudonym Systems
Sort
View
BIOSIG
2003
115views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Pseudonyme Biometrik: Ein signatur-basierter Ansatz
Abstract: Dieser Artikel stellt einen Ansatz zur Pseudonymisierung biometrischer Daten vor. Im Unterschied zu bisher bestehenden Ans¨atzen, setzt die Pseudonymisierung bereits bei...
Martin Johns
IH
2001
Springer
15 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
2001
Springer
15 years 2 months ago
The Strong Eternity Service
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Tonda Benes
SAC
2010
ACM
14 years 8 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...