Sciweavers

677 search results - page 1 / 136
» Secure Pseudonymous Channels
Sort
View
54
Voted
ESORICS
2009
Springer
15 years 10 months ago
Secure Pseudonymous Channels
Luca Viganò, Sebastian Mödersheim
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 3 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
DIAU
2000
Springer
15 years 1 months ago
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, u...
Andreas Pfitzmann, Marit Köhntopp
MMMACNS
2005
Springer
15 years 3 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
ESAS
2004
Springer
15 years 3 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk