|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1958 occurrences of 912 keywords
|
|
|
Results
Found 5425 publication records. Showing 5424 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing.  |
ACSAC  |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
73 | Hee-Un Park, Dong-Myung Shin |
Intelligent Anonymous Secure E-Voting Scheme.  |
KES (2)  |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Secure Selection, Intelligent Magic Sticker, Anonymous Authentication |
73 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication.  |
VIETCRYPT  |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
66 | Yanhui Wu, Weiping Wang 0003, Jianer Chen |
A Novel Anonymous Communication Strategy with Respect to Payment Mechanism.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
59 | James Aspnes, Faith Ellen Fich, Eric Ruppert |
Relationships between broadcast and shared memory in reliable anonymous distributed systems.  |
Distributed Comput.  |
2006 |
DBLP DOI BibTeX RDF |
Simulations, Robustness, Broadcast, Anonymous, Shared memory |
59 | He Ge |
An Anonymous Authentication Scheme for Identification Card.  |
ICICS  |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature |
59 | Shlomi Dolev, Andreas Pfitzmann, Rafail Ostrovsky |
05411 Abstracts Collection -- Anonymous Communication and its Applications.  |
Anonymous Communication and its Applications  |
2005 |
DBLP BibTeX RDF |
|
59 | Alfredo De Santis, Barbara Masucci |
Anonymous Membership Broadcast Schemes.  |
Des. Codes Cryptogr.  |
2004 |
DBLP DOI BibTeX RDF |
anonymity, permutation groups, pseudorandom permutations |
56 | Igor Margasinski |
A Parallelism-Based Approach to Network Anonymization.  |
NordSec  |
2009 |
DBLP DOI BibTeX RDF |
anonymous network architectures, privacy, anonymity, Communication system security |
55 | Ray-I Chang, Chih-Chun Chu |
An Efficient Anonymous Scheme for Mutual Anonymous Communications.  |
ICN (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
52 | Xinyuan Wang 0005, Shiping Chen 0003, Sushil Jajodia |
Tracking anonymous peer-to-peer VoIP calls on the internet.  |
CCS  |
2005 |
DBLP DOI BibTeX RDF |
VoIP tracing, anonymous VoIP calls, peer-to-peer, VoIP, anonymous communication |
52 | Shlomi Dolev, Rafail Ostrovsky |
Xor-trees for efficient anonymous multicast and reception.  |
ACM Trans. Inf. Syst. Secur.  |
2000 |
DBLP DOI BibTeX RDF |
anonymous multicast, anonymous communication |
52 | Vishal Saraswat, Aaram Yun |
Anonymous Signatures Revisited.  |
ProvSec  |
2009 |
DBLP DOI BibTeX RDF |
anonymous signature, unpreten- dability, anonymity, signature |
52 | Duong Viet, Akihiro Yamamura, Hidema Tanaka |
Anonymous Password-Based Authenticated Key Exchange.  |
INDOCRYPT  |
2005 |
DBLP DOI BibTeX RDF |
Password-based authenticated key exchange, Anonymous group authentication, Oblivious transfer |
52 | Russell Impagliazzo, Sara Miner More |
Anonymous credentials with biometrically-enforced non-transferability.  |
WPES  |
2003 |
DBLP DOI BibTeX RDF |
non-transferability, subliminal-freeness, biometrics, revocation, anonymous credentials |
52 | Whe Dar Lin, Jinn-ke Jan |
A Wireless-based Authentication and Anonymous Channels for Large Scale Area.  |
ISCC  |
2001 |
DBLP DOI BibTeX RDF |
Mobile stations (MSs), anonymous channel, home network (HN), visit network (VN) mobile network switching center (MSC) |
52 | Josep Domingo-Ferrer |
Anonymous Fingerprinting Based on Committed Oblivious Transfer.  |
Public Key Cryptography  |
1999 |
DBLP DOI BibTeX RDF |
Anonymous fingerprinting, Committed oblivious transfer, Intellectual property protection, Secure electronic commerce |
52 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures.  |
Inscrypt  |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
52 | Chao-Chin Chou, David S. L. Wei, C.-C. Jay Kuo, Kshirasagar Naik |
An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks.  |
IEEE J. Sel. Areas Commun.  |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Koji Chida, Osamu Shionoiri, Atsushi Kanai |
Secure Anonymous Communications with Practical Anonymity Revocation Scheme.  |
IWSEC  |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Gang Yao, Dengguo Feng |
A New k-Anonymous Message Transmission Protocol.  |
WISA  |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Philippe Golle, Markus Jakobsson |
Reusable anonymous return channels.  |
WPES  |
2003 |
DBLP DOI BibTeX RDF |
return address, privacy, anonymity, mix networks |
52 | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji |
An Agent-Based Model of Anonymous Communication Protocols.  |
WETICE  |
2001 |
DBLP DOI BibTeX RDF |
|
49 | Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson |
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.  |
ICISC  |
2006 |
DBLP DOI BibTeX RDF |
Anonymous channel, Klein bottle routing, mix network, onion routing |
49 | Shlomi Dolev, Rafail Ostrovsky, Andreas Pfitzmann (eds.) |
Anonymous Communication and its Applications, 09.10. - 14.10.2005  |
Anonymous Communication and its Applications  |
2006 |
DBLP BibTeX RDF |
|
49 | Claudia Díaz |
Anonymity Metrics Revisited.  |
Anonymous Communication and its Applications  |
2005 |
DBLP BibTeX RDF |
|
49 | George Danezis, Claudia Díaz |
Improving the Decoding Efficiency of Private Search.  |
Anonymous Communication and its Applications  |
2005 |
DBLP BibTeX RDF |
|
49 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols.  |
ARES  |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Xiaogang Wang, Darren Xu, Junzhou Luo |
A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards.  |
ATC  |
2008 |
DBLP DOI BibTeX RDF |
Colluded Truncation, Anonymous Onion Routing, Mobile Agent |
48 | Daniel R. Simon |
Anonymous Communication and Anonymous Cash.  |
CRYPTO  |
1996 |
DBLP DOI BibTeX RDF |
anonymous communication, Electronic cash |
45 | Michael Okun, Amnon Barak |
Efficient Algorithms for Anonymous Byzantine Agreement.  |
Theory Comput. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
Anonymous distributed algorithms, Distributed fault tolerant computing, Byzantine agreement, Anonymous networks |
45 | Michael Backes 0001, Jan Camenisch, Dieter Sommer |
Anonymous yet accountable access control.  |
WPES  |
2005 |
DBLP DOI BibTeX RDF |
anonymous transactions, privacy, access control, certificates, accountability, anonymous credentials |
45 | Nathalie Weiler |
Secure Anonymous Group Infrastructure for Common and Future Internet Applications.  |
ACSAC  |
2001 |
DBLP DOI BibTeX RDF |
scalable anonymity, configurable end-to-end anonymous communication, pseudonymous multicast, anonymous group communication |
45 | Emdad Ahmed, Hasan M. Jamil |
Post processing wrapper generated tables for labeling anonymous datasets.  |
WIDM  |
2009 |
DBLP DOI BibTeX RDF |
anonymous datasets, ontology, wrapper, hidden web, web data integration, html forms |
45 | Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng |
A Novel ID-Based Anonymous Signcryption Scheme.  |
APWeb/WAIM  |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, ID-based ring signature, security proof |
45 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
45 | T. Rajendran, K. V. Sreenaath |
Secure anonymous routing in ad hoc networks.  |
Bangalore Compute Conf.  |
2008 |
DBLP DOI BibTeX RDF |
anonymous routing, ad-hoc network |
45 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials.  |
ICICS  |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
45 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
Universally composable anonymous Hash certification model.  |
Sci. China Ser. F Inf. Sci.  |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymous, Hash, universal composable security |
45 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices.  |
Public Key Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
45 | Wen-Guey Tzeng |
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.  |
AsiaCCS  |
2006 |
DBLP DOI BibTeX RDF |
entity security, hierarchical keys, trapdoor time-sharable sequence, world wide web security, anonymous authentication |
45 | Jan Camenisch, Els Van Herreweghen |
Design and implementation of the idemix anonymous credential system.  |
CCS  |
2002 |
DBLP DOI BibTeX RDF |
privacy, cryptographic protocols, anonymous credential systems |
45 | Masafumi Yamashita, Tsunehiko Kameda |
Computing on Anonymous Networks: Part II-Decision and Membership Problems.  |
IEEE Trans. Parallel Distributed Syst.  |
1996 |
DBLP DOI BibTeX RDF |
edge election, spanning tree construction, topology recognition, distributed computing, NP-completeness, computability, leader election, Anonymous network |
45 | Poppy L. McLeod, Scott E. Elston |
Persuasive linguistic devices in anonymous vs. identified computer supported groups: an exploratory study.  |
HICSS (4)  |
1995 |
DBLP DOI BibTeX RDF |
persuasive linguistic devices, anonymous computer supported groups, identified computer supported groups, jury decision-making task, character identities, factual information errors, compromise requests, persuasive arguments, groupware, human factors, cooperation, consensus, flexibility, group decision support systems, linguistics, polling, negotiation support systems, electronic communication, law administration |
45 | Alejandro Hevia, Daniele Micciancio |
An Indistinguishability-Based Characterization of Anonymous Channels.  |
Privacy Enhancing Technologies  |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Li Xiao 0001, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu 0001 |
A design of overlay anonymous multicast protocol.  |
IPDPS  |
2006 |
DBLP DOI BibTeX RDF |
|
45 | James Aspnes, Faith E. Fich, Eric Ruppert |
Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems.  |
DISC  |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Larry Korba, Ronggong Song, George Yee |
Anonymous Communications for Mobile Agents.  |
MATA  |
2002 |
DBLP DOI BibTeX RDF |
|
45 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion).  |
Security Protocols Workshop  |
2000 |
DBLP DOI BibTeX RDF |
|
42 | George Danezis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption.  |
ISC  |
2006 |
DBLP DOI BibTeX RDF |
Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications |
42 | Xing Jin, Wai-Pun Ken Yiu, S.-H. Gary Chan, Yajun Wang |
Network Topology Inference Based on End-to-End Measurements.  |
IEEE J. Sel. Areas Commun.  |
2006 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Reverse Engineering North Korea's Gaming Economy: Intellectual Property, Microtransactions, and Censorship.  |
Game Stud.  |
2022 |
DBLP BibTeX RDF |
|
39 | anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr |
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior.  |
FOCI @ USENIX Security Symposium  |
2020 |
DBLP BibTeX RDF |
|
39 | Christine Geeng, anonymous |
EGregor: An Eldritch Privacy Mental Model for Smart Assistants.  |
CHI Extended Abstracts  |
2020 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Real or surreal: A pilot study on creative idea generation in MR vs. VR.  |
VR Workshops  |
2020 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Accurate pupil boundary detection using angular integral projection and bezier curves.  |
SIU  |
2018 |
DBLP DOI BibTeX RDF |
|
39 | Michael Carl Tschantz, Sadia Afroz 0001, anonymous, Vern Paxson |
SoK: Towards Grounding Censorship Circumvention in Empiricism.  |
IEEE Symposium on Security and Privacy  |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous |
Toward Mending Two Nation-Scale Brokered Identification Systems.  |
Proc. Priv. Enhancing Technol.  |
2015 |
DBLP DOI BibTeX RDF |
|
39 | Paul Nevai, anonymous |
The Bernstein inequality and the Schur inequality are equivalent.  |
J. Approx. Theory  |
2014 |
DBLP DOI BibTeX RDF |
|
39 | Jonathan Parris, Michael J. Wilber, Brian Heflin, Ham M. Rara, Ahmed El-Barkouky, Aly A. Farag, Javier R. Movellan, anonymous, Modesto Castrillón Santana, Javier Lorenzo-Navarro, Mohammad Nayeem Teli, Sébastien Marcel, Cosmin Atanasoaei, Terrance E. Boult |
Face and eye detection on hard datasets.  |
IJCB  |
2011 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Notes from the other side: kudos and complaints from my first e-learning experience.  |
eLearn Mag.  |
2008 |
DBLP DOI BibTeX RDF |
|
39 | anonymous, Guido Hogen |
Die Chipkarte der Deutschen Kreditwirtschaft - Übersicht und aktuelle Entwicklungen.  |
Datenschutz und Datensicherheit  |
2002 |
DBLP BibTeX RDF |
|
39 | anonymous |
The QED Manifesto.  |
CADE  |
1994 |
DBLP BibTeX RDF |
|
39 | anonymous |
Book review: Encyclopedia of Artifical Intelligence. Edited by S. C. Shapiro (Wiley-lnterscience, 1987).  |
SIGART Newsl.  |
1988 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
EDP as a national resource.  |
AFIPS Fall Joint Computing Conference  |
1962 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Statements from manufacturers on standardization of magnetic tape records.  |
AIEE-IRE Computer Conference (Eastern)  |
1955 |
DBLP DOI BibTeX RDF |
|
38 | Yang Zhang |
An Efficient Anonymous Authentication Protocol with Pseudonym Revocability.  |
NCM  |
2009 |
DBLP DOI BibTeX RDF |
Anonymous Authentication Protocol, Anonymous Routing Protocol, Pseudonym, Digital Signature Scheme |
38 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings.  |
Int. J. Inf. Sec.  |
2009 |
DBLP DOI BibTeX RDF |
Direct anonymous attestation, User-controlled-anonymity, User-controlled-traceability, Trusted computing, Bilinear maps |
38 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication.  |
AsiaCCS  |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
38 | Patrik Bichsel, Jan Camenisch, Thomas Groß 0001, Victor Shoup |
Anonymous credentials on a standard java card.  |
CCS  |
2009 |
DBLP DOI BibTeX RDF |
privacy-enhancing systems, smart card, java card, anonymous credential systems |
38 | Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang |
Analysis and Improvement of an ID-Based Anonymous Signcryption Model.  |
ICIC (1)  |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, anonymity, bilinear pairings, unforgeability |
38 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
38 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET.  |
MOBILIGHT  |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
38 | Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 |
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks.  |
J. Comput. Sci. Technol.  |
2008 |
DBLP DOI BibTeX RDF |
adaptive anonymity, privacy, vehicular network, anonymous authentication |
38 | Marina Blanton |
Online subscriptions with anonymous access.  |
AsiaCCS  |
2008 |
DBLP DOI BibTeX RDF |
anonymous access, privacy, signatures, zero-knowledge proofs |
38 | Patrick P. Tsang, Sean W. Smith |
PPAA: Peer-to-Peer Anonymous Authentication.  |
ACNS  |
2008 |
DBLP DOI BibTeX RDF |
privacy, VANets, reputation systems, credentials, anonymous authentication, secret handshakes |
38 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps.  |
TRUST  |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
38 | Jing Yang, Zhenfeng Zhang |
A New Anonymous Password-Based Authenticated Key Exchange Protocol.  |
INDOCRYPT  |
2008 |
DBLP DOI BibTeX RDF |
Password-based AKE, Anonymous authentication |
38 | Rachid Guerraoui, Eric Ruppert |
Anonymous and fault-tolerant shared-memory computing.  |
Distributed Comput.  |
2007 |
DBLP DOI BibTeX RDF |
Anonymous, Shared memory, Consensus, Timestamps, Snapshots |
38 | Andrzej Pelc |
Activating anonymous ad hoc radio networks.  |
Distributed Comput.  |
2007 |
DBLP DOI BibTeX RDF |
Algorithm, Ad hoc network, Synchronous, Broadcasting, Anonymous, Asynchronous, Activating, Radio network |
38 | Shantanu Das 0001, Shay Kutten, Ayelet Yifrach |
Improved Distributed Exploration of Anonymous Networks.  |
ICDCN  |
2006 |
DBLP DOI BibTeX RDF |
unlabeled nodes, asynchronous distributed leader election, k agents, map construction, anonymous network |
38 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost.  |
Public Key Cryptography  |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
38 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis.  |
ACNS  |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
38 | Jiang Zhang, Bin Li, Li Zhao 0006, Shi-Qiang Yang |
License management scheme with anonymous trust for digital rights management.  |
ICME  |
2005 |
DBLP DOI BibTeX RDF |
usage tracking scheme, license management scheme-anonymous trust, LMSAT, DRM system, license acquisition, digital rights management, user privacy |
38 | Tobias Straub, Andreas Heinemann |
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation.  |
SAC  |
2004 |
DBLP DOI BibTeX RDF |
bonus point system, iClouds, ad hoc networking, anonymous, mobile commerce |
38 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper |
k-anonymous message transmission.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
untraceable communication, privacy, anonymity, cryptographic protocols, multiparty computation, anonymous communication |
38 | Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan |
P5: A Protocol for Scalable Anonymous Communication.  |
S&P  |
2002 |
DBLP DOI BibTeX RDF |
security, privacy, network, anonymous |
38 | Myungsun Kim, Jongseong Kim, Kwangjo Kim |
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.  |
ICICS  |
2002 |
DBLP DOI BibTeX RDF |
asymmetric and symmetric fingerprinting, Bilinear Diffie-Hellman problem, Security reduction, Anonymous, Intellectual property protection |
38 | Evangelos Kranakis, Nicola Santoro |
Distributed computing on oriented anonymous hypercubes with faulty components.  |
Distributed Comput.  |
2001 |
DBLP DOI BibTeX RDF |
Faulty links and/or nodes, Boolean functions, Hypercubes, Computability, Anonymous networks |
38 | Masafumi Yamashita, Tsunehiko Kameda |
Computing on Anonymous Networks: Part I-Characterizing the Solvable Cases.  |
IEEE Trans. Parallel Distributed Syst.  |
1996 |
DBLP DOI BibTeX RDF |
edge election, spanning tree construction, topology recognition, distributed computing, knowledge, leader election, Anonymous network |
38 | Evangelos Kranakis, Nicola Santoro |
Distributed Computing on Anonymous Hypercubes with Faulty Components (Extended Abstract).  |
WDAG  |
1992 |
DBLP DOI BibTeX RDF |
Anonymous labeled hypercube, faulty component, group of automorphisms, boolean function, diameter |
38 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Practical Anonymous Divisible E-Cash from Bounded Accumulators.  |
Financial Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems.  |
SCN  |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Min-Hua Shao, Shin-Jia Huang |
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks.  |
PDCAT  |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, Nalini K. Ratha |
Anonymous and Revocable Fingerprint Recognition.  |
CVPR  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Jan Bouda, Josef Sprojcar |
Anonymous Transmission of Quantum Information.  |
ICQNM  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Peter C. Johnson 0001, Apu Kapadia, Patrick P. Tsang, Sean W. Smith |
Nymble: Anonymous IP-Address Blocking.  |
Privacy Enhancing Technologies  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.  |
IWSEC  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Xinyuan Wang 0005, Shiping Chen 0003, Sushil Jajodia |
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.  |
S&P  |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5424 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|