|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1958 occurrences of 912 keywords
|
|
|
Results
Found 5425 publication records. Showing 5424 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 95-104, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
73 | Hee-Un Park, Dong-Myung Shin |
Intelligent Anonymous Secure E-Voting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 726-736, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Secure Selection, Intelligent Magic Sticker, Anonymous Authentication |
73 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 81-98, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
66 | Yanhui Wu, Weiping Wang 0003, Jianer Chen |
A Novel Anonymous Communication Strategy with Respect to Payment Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1527-1531, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | James Aspnes, Faith Ellen Fich, Eric Ruppert |
Relationships between broadcast and shared memory in reliable anonymous distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 18(3), pp. 209-219, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Simulations, Robustness, Broadcast, Anonymous, Shared memory |
59 | He Ge |
An Anonymous Authentication Scheme for Identification Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 238-248, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature |
59 | Shlomi Dolev, Andreas Pfitzmann, Rafail Ostrovsky |
05411 Abstracts Collection -- Anonymous Communication and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Anonymous Communication and its Applications ![In: Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
59 | Alfredo De Santis, Barbara Masucci |
Anonymous Membership Broadcast Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 32(1-3), pp. 135-151, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anonymity, permutation groups, pseudorandom permutations |
56 | Igor Margasinski |
A Parallelism-Based Approach to Network Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 28-43, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous network architectures, privacy, anonymity, Communication system security |
55 | Ray-I Chang, Chih-Chun Chu |
An Efficient Anonymous Scheme for Mutual Anonymous Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 835-843, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
52 | Xinyuan Wang 0005, Shiping Chen 0003, Sushil Jajodia |
Tracking anonymous peer-to-peer VoIP calls on the internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 81-91, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
VoIP tracing, anonymous VoIP calls, peer-to-peer, VoIP, anonymous communication |
52 | Shlomi Dolev, Rafail Ostrovsky |
Xor-trees for efficient anonymous multicast and reception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(2), pp. 63-84, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
anonymous multicast, anonymous communication |
52 | Vishal Saraswat, Aaram Yun |
Anonymous Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 140-153, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signature, unpreten- dability, anonymity, signature |
52 | Duong Viet, Akihiro Yamamura, Hidema Tanaka |
Anonymous Password-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 244-257, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Password-based authenticated key exchange, Anonymous group authentication, Oblivious transfer |
52 | Russell Impagliazzo, Sara Miner More |
Anonymous credentials with biometrically-enforced non-transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 60-71, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
non-transferability, subliminal-freeness, biometrics, revocation, anonymous credentials |
52 | Whe Dar Lin, Jinn-ke Jan |
A Wireless-based Authentication and Anonymous Channels for Large Scale Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 36-41, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Mobile stations (MSs), anonymous channel, home network (HN), visit network (VN) mobile network switching center (MSC) |
52 | Josep Domingo-Ferrer |
Anonymous Fingerprinting Based on Committed Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 43-52, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Anonymous fingerprinting, Committed oblivious transfer, Intellectual property protection, Secure electronic commerce |
52 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 60-71, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
52 | Chao-Chin Chou, David S. L. Wei, C.-C. Jay Kuo, Kshirasagar Naik |
An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 25(1), pp. 192-203, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Koji Chida, Osamu Shionoiri, Atsushi Kanai |
Secure Anonymous Communications with Practical Anonymity Revocation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 352-364, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Gang Yao, Dengguo Feng |
A New k-Anonymous Message Transmission Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 388-399, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Philippe Golle, Markus Jakobsson |
Reusable anonymous return channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 94-100, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
return address, privacy, anonymity, mix networks |
52 | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji |
An Agent-Based Model of Anonymous Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 177-182, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
49 | Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson |
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 296-309, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymous channel, Klein bottle routing, mix network, onion routing |
49 | Shlomi Dolev, Rafail Ostrovsky, Andreas Pfitzmann (eds.) |
Anonymous Communication and its Applications, 09.10. - 14.10.2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Anonymous Communication and its Applications ![Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
49 | Claudia Díaz |
Anonymity Metrics Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Anonymous Communication and its Applications ![In: Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
49 | George Danezis, Claudia Díaz |
Improving the Decoding Efficiency of Private Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Anonymous Communication and its Applications ![In: Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
49 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1190-1196, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Xiaogang Wang, Darren Xu, Junzhou Luo |
A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 588-602, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Colluded Truncation, Anonymous Onion Routing, Mobile Agent |
48 | Daniel R. Simon |
Anonymous Communication and Anonymous Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 61-73, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
anonymous communication, Electronic cash |
45 | Michael Okun, Amnon Barak |
Efficient Algorithms for Anonymous Byzantine Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 42(2), pp. 222-238, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymous distributed algorithms, Distributed fault tolerant computing, Byzantine agreement, Anonymous networks |
45 | Michael Backes 0001, Jan Camenisch, Dieter Sommer |
Anonymous yet accountable access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 40-46, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anonymous transactions, privacy, access control, certificates, accountability, anonymous credentials |
45 | Nathalie Weiler |
Secure Anonymous Group Infrastructure for Common and Future Internet Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 401-410, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
scalable anonymity, configurable end-to-end anonymous communication, pseudonymous multicast, anonymous group communication |
45 | Emdad Ahmed, Hasan M. Jamil |
Post processing wrapper generated tables for labeling anonymous datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIDM ![In: 11th ACM International Workshop on Web Information and Data Management (WIDM 2009), Hong Kong, China, November 2, 2008, pp. 63-66, 2009, ACM, 978-1-60558-808-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous datasets, ontology, wrapper, hidden web, web data integration, html forms |
45 | Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng |
A Novel ID-Based Anonymous Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM ![In: Advances in Data and Web Management, Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings, pp. 604-610, 2009, Springer, 978-3-642-00671-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, ID-based ring signature, security proof |
45 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 333-344, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
45 | T. Rajendran, K. V. Sreenaath |
Secure anonymous routing in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008, pp. 19, 2008, ACM, 978-1-59593-950-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymous routing, ad-hoc network |
45 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 65-80, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
45 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
Universally composable anonymous Hash certification model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 440-455, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymous, Hash, universal composable security |
45 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 16-30, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
45 | Wen-Guey Tzeng |
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 223-230, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
entity security, hierarchical keys, trapdoor time-sharable sequence, world wide web security, anonymous authentication |
45 | Jan Camenisch, Els Van Herreweghen |
Design and implementation of the idemix anonymous credential system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 21-30, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy, cryptographic protocols, anonymous credential systems |
45 | Masafumi Yamashita, Tsunehiko Kameda |
Computing on Anonymous Networks: Part II-Decision and Membership Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 7(1), pp. 90-96, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
edge election, spanning tree construction, topology recognition, distributed computing, NP-completeness, computability, leader election, Anonymous network |
45 | Poppy L. McLeod, Scott E. Elston |
Persuasive linguistic devices in anonymous vs. identified computer supported groups: an exploratory study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 163-170, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
persuasive linguistic devices, anonymous computer supported groups, identified computer supported groups, jury decision-making task, character identities, factual information errors, compromise requests, persuasive arguments, groupware, human factors, cooperation, consensus, flexibility, group decision support systems, linguistics, polling, negotiation support systems, electronic communication, law administration |
45 | Alejandro Hevia, Daniele Micciancio |
An Indistinguishability-Based Characterization of Anonymous Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 24-43, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Li Xiao 0001, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu 0001 |
A design of overlay anonymous multicast protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | James Aspnes, Faith E. Fich, Eric Ruppert |
Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 18th International Conference, DISC 2004, Amsterdam, The Netherlands, October 4-7, 2004, Proceedings, pp. 260-274, 2004, Springer, 3-540-23306-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Larry Korba, Ronggong Song, George Yee |
Anonymous Communications for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, 4th International Workshop, MATA 2002 Barcelona, Spain, October 23-24, 2002, Proceedings, pp. 171-181, 2002, Springer, 3-540-00021-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 223-233, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | George Danezis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 46-59, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications |
42 | Xing Jin, Wai-Pun Ken Yiu, S.-H. Gary Chan, Yajun Wang |
Network Topology Inference Based on End-to-End Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(12), pp. 2182-2195, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Reverse Engineering North Korea's Gaming Economy: Intellectual Property, Microtransactions, and Censorship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Game Stud. ![In: Game Stud. 22(1), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
39 | anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr |
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI @ USENIX Security Symposium ![In: 10th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2020, August 11, 2020., 2020, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
39 | Christine Geeng, anonymous |
EGregor: An Eldritch Privacy Mental Model for Smart Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, Honolulu, HI, USA, April 25-30, 2020, pp. 1-9, 2020, ACM, 978-1-4503-6819-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Real or surreal: A pilot study on creative idea generation in MR vs. VR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VR Workshops ![In: 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VR Workshops, Atlanta, GA, USA, March 22-26, 2020, pp. 677-678, 2020, IEEE, 978-1-7281-6532-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Accurate pupil boundary detection using angular integral projection and bezier curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 26th Signal Processing and Communications Applications Conference, SIU 2018, Izmir, Turkey, May 2-5, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-1501-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
39 | Michael Carl Tschantz, Sadia Afroz 0001, anonymous, Vern Paxson |
SoK: Towards Grounding Censorship Circumvention in Empiricism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pp. 914-933, 2016, IEEE Computer Society, 978-1-5090-0824-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous |
Toward Mending Two Nation-Scale Brokered Identification Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2015(2), pp. 135-155, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
39 | Paul Nevai, anonymous |
The Bernstein inequality and the Schur inequality are equivalent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Approx. Theory ![In: J. Approx. Theory 182, pp. 103-109, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
39 | Jonathan Parris, Michael J. Wilber, Brian Heflin, Ham M. Rara, Ahmed El-Barkouky, Aly A. Farag, Javier R. Movellan, anonymous, Modesto Castrillón Santana, Javier Lorenzo-Navarro, Mohammad Nayeem Teli, Sébastien Marcel, Cosmin Atanasoaei, Terrance E. Boult |
Face and eye detection on hard datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCB ![In: 2011 IEEE International Joint Conference on Biometrics, IJCB 2011, Washington, DC, USA, October 11-13, 2011, pp. 1-10, 2011, IEEE Computer Society, 978-1-4577-1358-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Notes from the other side: kudos and complaints from my first e-learning experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eLearn Mag. ![In: eLearn Mag. 2008(6), pp. 3, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | anonymous, Guido Hogen |
Die Chipkarte der Deutschen Kreditwirtschaft - Übersicht und aktuelle Entwicklungen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 26(5), 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
39 | anonymous |
The QED Manifesto. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CADE ![In: Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings, pp. 238-251, 1994, Springer, 3-540-58156-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
39 | anonymous |
Book review: Encyclopedia of Artifical Intelligence. Edited by S. C. Shapiro (Wiley-lnterscience, 1987). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGART Newsl. ![In: SIGART Newsl. 105, pp. 10-11, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
EDP as a national resource. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS Fall Joint Computing Conference ![In: Proceedings of the 1962 fall joint computer conference, AFIPS 1962 (Fall), Philadelphia, Pennsylvania, USA, December 4-6, 1962, pp. 71-72, 1962, ACM, 978-1-4503-7879-6. The full citation details ...](Pics/full.jpeg) |
1962 |
DBLP DOI BibTeX RDF |
|
39 | anonymous |
Statements from manufacturers on standardization of magnetic tape records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIEE-IRE Computer Conference (Eastern) ![In: Papers and discussions presented at the the eastern joint AIEE-IRE computer conference: Computers in business and industrial systems, AIEE-IRE 1955 (Eastern), Boston, Massachusetts, USA, November 7-9, 1955, pp. 90-94, 1955, ACM, 978-1-4503-7857-4. The full citation details ...](Pics/full.jpeg) |
1955 |
DBLP DOI BibTeX RDF |
|
38 | Yang Zhang |
An Efficient Anonymous Authentication Protocol with Pseudonym Revocability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 1929-1934, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anonymous Authentication Protocol, Anonymous Routing Protocol, Pseudonym, Digital Signature Scheme |
38 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(5), pp. 315-330, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Direct anonymous attestation, User-controlled-anonymity, User-controlled-traceability, Trusted computing, Bilinear maps |
38 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 372-375, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
38 | Patrik Bichsel, Jan Camenisch, Thomas Groß 0001, Victor Shoup |
Anonymous credentials on a standard java card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 600-610, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy-enhancing systems, smart card, java card, anonymous credential systems |
38 | Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang |
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings, pp. 433-442, 2009, Springer, 978-3-642-04069-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, anonymity, bilinear pairings, unforgeability |
38 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 481-500, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
38 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 35-44, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
38 | Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 |
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(6), pp. 916-928, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adaptive anonymity, privacy, vehicular network, anonymous authentication |
38 | Marina Blanton |
Online subscriptions with anonymous access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 217-227, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymous access, privacy, signatures, zero-knowledge proofs |
38 | Patrick P. Tsang, Sean W. Smith |
PPAA: Peer-to-Peer Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 55-74, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, VANets, reputation systems, credentials, anonymous authentication, secret handshakes |
38 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 166-178, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
38 | Jing Yang, Zhenfeng Zhang |
A New Anonymous Password-Based Authenticated Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 200-212, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Password-based AKE, Anonymous authentication |
38 | Rachid Guerraoui, Eric Ruppert |
Anonymous and fault-tolerant shared-memory computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 20(3), pp. 165-177, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymous, Shared memory, Consensus, Timestamps, Snapshots |
38 | Andrzej Pelc |
Activating anonymous ad hoc radio networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 19(5-6), pp. 361-371, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Algorithm, Ad hoc network, Synchronous, Broadcasting, Anonymous, Asynchronous, Activating, Radio network |
38 | Shantanu Das 0001, Shay Kutten, Ayelet Yifrach |
Improved Distributed Exploration of Anonymous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006., pp. 306-318, 2006, Springer, 3-540-68139-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
unlabeled nodes, asynchronous distributed leader election, k agents, map construction, anonymous network |
38 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 525-542, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
38 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 334-349, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
38 | Jiang Zhang, Bin Li, Li Zhao 0006, Shi-Qiang Yang |
License management scheme with anonymous trust for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 257-260, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
usage tracking scheme, license management scheme-anonymous trust, LMSAT, DRM system, license acquisition, digital rights management, user privacy |
38 | Tobias Straub, Andreas Heinemann |
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 766-773, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
bonus point system, iClouds, ad hoc networking, anonymous, mobile commerce |
38 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper |
k-anonymous message transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 122-130, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
untraceable communication, privacy, anonymity, cryptographic protocols, multiparty computation, anonymous communication |
38 | Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan |
P5: A Protocol for Scalable Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 58-70, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, privacy, network, anonymous |
38 | Myungsun Kim, Jongseong Kim, Kwangjo Kim |
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 97-108, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric and symmetric fingerprinting, Bilinear Diffie-Hellman problem, Security reduction, Anonymous, Intellectual property protection |
38 | Evangelos Kranakis, Nicola Santoro |
Distributed computing on oriented anonymous hypercubes with faulty components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 14(3), pp. 185-189, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Faulty links and/or nodes, Boolean functions, Hypercubes, Computability, Anonymous networks |
38 | Masafumi Yamashita, Tsunehiko Kameda |
Computing on Anonymous Networks: Part I-Characterizing the Solvable Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 7(1), pp. 69-89, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
edge election, spanning tree construction, topology recognition, distributed computing, knowledge, leader election, Anonymous network |
38 | Evangelos Kranakis, Nicola Santoro |
Distributed Computing on Anonymous Hypercubes with Faulty Components (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 6th International Workshop, WDAG '92, Haifa, Israel, November 2-4, 1992, Proceedings, pp. 253-263, 1992, Springer, 3-540-56188-9. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Anonymous labeled hypercube, faulty component, group of automorphisms, boolean function, diameter |
38 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Practical Anonymous Divisible E-Cash from Bounded Accumulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 287-301, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 57-76, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Min-Hua Shao, Shin-Jia Huang |
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, Otago, New Zealand, 1-4 December 2008, pp. 335-341, 2008, IEEE Computer Society, 978-0-7695-3443-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, Nalini K. Ratha |
Anonymous and Revocable Fingerprint Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Jan Bouda, Josef Sprojcar |
Anonymous Transmission of Quantum Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICQNM ![In: First International Conference on Quantum, Nano, and Micro Technologies, ICQNM 2007, January 2-6, 2007, Guadeloupe, French Caribbean, pp. 12, 2007, IEEE Computer Society, 0-7695-2759-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Peter C. Johnson 0001, Apu Kapadia, Patrick P. Tsang, Sean W. Smith |
Nymble: Anonymous IP-Address Blocking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 113-133, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 444-458, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Xinyuan Wang 0005, Shiping Chen 0003, Sushil Jajodia |
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 116-130, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5424 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|