Sciweavers

796 search results - page 99 / 160
» The Anonymous Subgraph Problem
Sort
View
93
Voted
ICPP
2006
IEEE
15 years 6 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
ESORICS
2006
Springer
15 years 4 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
AUSAI
2008
Springer
15 years 2 months ago
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
Data anonymization techniques based on enhanced privacy principles have been the focus of intense research in the last few years. All existing methods achieving privacy principles ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
88
Voted
JCST
2007
98views more  JCST 2007»
15 years 22 days ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
120
Voted
SAGT
2010
Springer
181views Game Theory» more  SAGT 2010»
14 years 11 months ago
On the Complexity of Pareto-optimal Nash and Strong Equilibria
We consider the computational complexity of coalitional solution concepts in scenarios related to load balancing such as anonymous and congestion games. In congestion games, Paret...
Martin Hoefer, Alexander Skopalik