|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
45 | Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia |
Anonymity and Historical-Anonymity in Location-Based Services. |
Privacy in Location-Based Applications |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina |
Brief announcement: anonymity and trust in distributed systems. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
anonymity in decentralized systems, formal verification, cryptographic protocols |
44 | Yabo Xu, Ke Wang 0001, Guoliang Yang, Ada Wai-Chee Fu |
Online anonymity for personalized web services. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
online anonymity, web services, privacy, personalization |
44 | Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura |
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Entropy, Electronic Voting, Multiparty Protocol |
44 | Benedikt Gierlichs, Carmela Troncoso, Claudia Díaz, Bart Preneel, Ingrid Verbauwhede |
Revisiting a combinatorial approach toward measuring anonymity. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
anonymity metric, privacy, graph theory, combinatorics |
44 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption |
44 | Hung-Yu Chien |
ID-Based Key Agreement with Anonymity for Ad Hoc Networks. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
ad hoc networks, anonymity, bilinear pairing, key agreement, identity-based cryptosystem |
44 | Gagan Aggarwal, Tomás Feder, Krishnaram Kenthapadi, Samir Khuller, Rina Panigrahy, Dilys Thomas, An Zhu |
Achieving anonymity via clustering. |
PODS |
2006 |
DBLP DOI BibTeX RDF |
clustering, privacy, approximation algorithms, anonymity |
44 | Seo-Il Kang, Im-Yeong Lee |
A Study on the E-Cash System with Anonymity and Divisibility. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
Anonymity, Divisibility, Electronic cash, Micropayment |
44 | Nick Feamster, Roger Dingledine |
Location diversity in anonymity networks. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
anonymity, mix networks, interdomain routing |
44 | Mida Guillermo, Keith M. Martin, Christine M. O'Keefe |
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
cryptography, anonymity, secret sharing |
44 | Brent R. Waters, Edward W. Felten, Amit Sahai |
Receiver anonymity via incomparable public keys. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
privacy, anonymity, public key cryptography, PGP |
44 | Bo Yang, Liu Dongsu, Yumin Wang |
An anonymity-revoking e-payment system with a smart card. |
Int. J. Digit. Libr. |
2002 |
DBLP DOI BibTeX RDF |
E-payment systems, Smart card, Anonymity revocation |
44 | Weidong Qiu, Kefei Chen, Dawu Gu |
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
revokable anonymity, fair off-line system, Privacy protecting, E-Cash, electronic payment |
44 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. |
WISE (1) |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Hash function, Traceability, Electronic-cash |
44 | Heechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya |
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. |
MDM |
2008 |
DBLP DOI BibTeX RDF |
Indexing, Anonymity, Location Based Services, k-anonymity |
42 | Yoshinobu Kawabe, Hideki Sakurada |
A Formal Approach to Designing Anonymous Software. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Hongyun Xu, Xinwen Fu, Ye Zhu 0001, Riccardo Bettati, Jianer Chen, Wei Zhao 0001 |
SAS: A Scalar Anonymous Communication System. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Jinsong Han, Yanmin Zhu, Yunhao Liu 0001, Jianfeng Cai 0003, Lei Hu |
Provide Privacy for Mobile P2P Systems. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
Probable Innocence Revisited. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Claudia Díaz, Len Sassaman, Evelyne Dewitte |
Comparison Between Two Practical Mix Designs. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Bo Zhu 0001, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao 0001, Robert H. Deng |
Anonymous Secure Routing in Mobile Ad-Hoc Networks. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Mehmet Ercan Nergiz, Chris Clifton, Ahmet Erhan Nergiz |
Multirelational k-Anonymity. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula |
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Ge Zhong, Urs Hengartner |
A Distributed k-Anonymity Protocol for Location Privacy. |
PerCom |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Jinsong Han, Yunhao Liu 0001 |
Mutual Anonymity for Mobile P2P Systems. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Toby Xu, Ying Cai |
Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Min Shao, Yi Yang 0002, Sencun Zhu, Guohong Cao |
Towards Statistically Strong Source Anonymity for Sensor Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Claudia Díaz, Carmela Troncoso, Andrei Serjantov |
On the Impact of Social Network Profiling on Anonymity. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro |
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Vanesa Daza, Josep Domingo-Ferrer |
On Partial Anonymity in Secret Sharing. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Protocols, Secret sharing |
40 | Mehmet Ercan Nergiz, Chris Clifton, Ahmet Erhan Nergiz |
MultiRelational k-Anonymity. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Prakash Panangaden |
Anonymity Protocols as Noisy Channels. |
TGC |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Byung Ryong Kim, Ki-Chang Kim |
Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing. |
NGITS |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Yuxin Deng, Jun Pang 0001, Peng Wu 0002 |
Measuring Anonymity with Relative Entropy. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Giuseppe Ciaccio |
Recipient Anonymity in a Structured Overlay. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Andrei Serjantov, Peter Sewell |
Passive-attack analysis for connection-based anonymity systems. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Anonymous communication systems, Traffic analysis |
40 | Mohit Bhargava, Catuscia Palamidessi |
Probabilistic Anonymity. |
CONCUR |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Aybek Mukhamedov, Mark Dermot Ryan |
On Anonymity with Identity Escrow. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu |
Enhancing Anonymity via Market Competition. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Matthieu Gaud, Jacques Traoré |
On the Anonymity of Fair Offline E-cash Systems. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 |
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Toru Nakanishi 0001, Nobuaki Haruna, Yuji Sugiyama |
Unlinkable Electronic Coupon Protocol with Anonymity Control. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Revocable Ring Signature. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocability, ring signature |
39 | Kazuki Yoneyama, Kazuo Ohta |
Ring signatures: universally composable definitions and constructions. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
anonymity, ring signature, universal composability, unforgeability |
39 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
39 | Rie Shigetomi, Akira Otsuka, Hideki Imai |
Anonymous authentication scheme for XML security standard with Refreshable Tokens. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
XML, anonymity, information security, privacy protection, credential system |
39 | Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma |
Efficient Public Auction with One-Time Registration and Public Verifiability. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability |
39 | Ahmad-Reza Sadeghi |
How to Break a Semi-anonymous Fingerprinting Scheme. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Fingerprinting, Copyright Protection, Oblivious Transfer |
39 | Markus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung |
Electronic Payments: Where Do We Go from Here?. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
security, e-commerce, anonymity, e-cash, electronic payments |
38 | François Bonnet 0001, Michel Raynal |
The Price of Anonymity: Optimal Consensus Despite Asynchrony, Crash and Anonymity. |
DISC |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Alina Campan, Traian Marius Truta, Nicholas Cooper |
User-controlled generalization boundaries for p-sensitive k-anonymity. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
p-sensitive k-anonymity, user constraints, anonymization |
37 | Han Zhu, Yonggen Gu, Xiaojuan Cai |
Knowledge Aware Bisimulation and Anonymity. |
ICCS (1) |
2009 |
DBLP DOI BibTeX RDF |
Applied Pi, Formal Methods, Network Security, Anonymity |
37 | Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu |
An improvement of secure authentication scheme with full anonymity for wireless communications. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
network security, anonymity, wireless communications, user authentication |
37 | Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz |
A Post-processing Method to Lessen k-Anonymity Dissimilarities. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
micro-aggreagtion, Security, Privacy, k-anonymity |
37 | Xiaoxun Sun, Min Li, Hua Wang 0002, Ashley W. Plank |
An efficient hash-based algorithm for minimal k-anonymity. |
ACSC |
2008 |
DBLP BibTeX RDF |
hash-based algorithm, microdata release, k-anonymity |
37 | Spyridon Papastergiou, Giorgos Valvis, Despina Polemi |
A holistic anonymity framework for web services. |
PETRA |
2008 |
DBLP DOI BibTeX RDF |
connection anonymity, hidden web serives, web services (WS), service oriented architecture (SOA) |
37 | Suriadi Suriadi, Ernest Foo, Jason Smith 0001 |
A User-Centric Protocol for Conditional Anonymity Revocation. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
user-centric identity, privacy, anonymity revocation |
37 | Jiejun Kong, Xiaoyan Hong, Mario Gerla |
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
identity-free routing, negligibility, network complexity theory, ad hoc network, Anonymity |
37 | Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam |
L-diversity: Privacy beyond k-anonymity. |
ACM Trans. Knowl. Discov. Data |
2007 |
DBLP DOI BibTeX RDF |
?-diversity, privacy-preserving data publishing, k-anonymity, Data privacy |
37 | Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin |
How much anonymity does network latency leak? |
CCS |
2007 |
DBLP DOI BibTeX RDF |
anonymity, latency |
37 | Joan Feigenbaum, Aaron Johnson 0001, Paul F. Syverson |
A Model of Onion Routing with Provable Anonymity. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Security, privacy, anonymity, onion routing |
37 | Claudia Díaz, Carmela Troncoso, George Danezis |
Does additional information always reduce anonymity? |
WPES |
2007 |
DBLP DOI BibTeX RDF |
anonymity metrics, entropy, user profiles, mix |
37 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Anonymity on Paillier's Trap-Door Permutation. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy |
37 | Chuang-Cheng Chiu, Chieh-Yuan Tsai |
A k -Anonymity Clustering Method for Effective Data Privacy Preservation. |
ADMA |
2007 |
DBLP DOI BibTeX RDF |
Data privacy preservation, C-means clustering algorithm, Clustering, k-Anonymity, Feature weighting |
37 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
37 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature |
37 | Josep Domingo-Ferrer, Vicenç Torra |
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation. |
Data Min. Knowl. Discov. |
2005 |
DBLP DOI BibTeX RDF |
microdata privacy, k-anonymity, database security, microaggregation |
37 | Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Protocol Providing User Anonymity in Open Network. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
Error-correcting codes, Mobile network, Key exchange, User authentication, User anonymity |
37 | Lavinia Egidi, Giovanni Porcelli |
Anonymity and certification: e-mail, a case study. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
anonymity, certification, e-mail |
37 | Dimitris Gritzalis, Nikolaos Kyrloglou |
Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. |
SCCC |
2001 |
DBLP DOI BibTeX RDF |
Security, Privacy, e-Commerce, Anonymity, User profile, Privacy-enhancing technologies (PET), Personal data, Infomediary |
37 | Christian Grosch |
Anonymization Services for IP Multicast. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
anonymisation services, business conferencing, group communication security, sender anonymity, receiver anonymity, Internet, performance analysis, transport protocols, video on demand, video on demand, security of data, teleconferencing, multicast communication, IP multicast, telecommunication security, Internet services, business communication, pay per view |
35 | Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung |
Non-homogeneous generalization in privacy preserving data publishing. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
non-homogeneous generalization, privacy, anonymization |
35 | Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim |
Scalable onion routing with torsk. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer networks, anonymous communication |
35 | Martijn Warnier, Frances M. T. Brazier |
Organized Anonymous Agents. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro |
An Efficient and Reliable Anonymous Solution for a Self-organized P2P Network. |
IPOM |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Xinyuan Wang 0005, Shiping Chen 0003, Sushil Jajodia |
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jinsong Han, Yunhao Liu 0001, Li Xiao 0001, Renyi Xiao, Lionel M. Ni |
A Mutual Anonymous Peer-to-Peer Protocol Design. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Bugra Gedik, Ling Liu 0001 |
Location Privacy in Mobile Systems: A Personalized Anonymization Model. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Heike Neumann, Thomas Schwarzpaul |
Fairness in Wallets with Observer. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
fairness, observer, Electronic cash |
35 | Jie Tang 0001, Juan-Zi Li, Kehong Wang, Yue-Ru Cai |
Research of Satisfying Atomic and Anonymous Electronic Commerce Protocol. |
GCC (2) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Dakshi Agrawal, Dogan Kesdogan, Stefan Penz |
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
35 | L. Jean Camp |
An Atomicity-Generating Protocol for Anonymous Currencies. |
IEEE Trans. Software Eng. |
2001 |
DBLP DOI BibTeX RDF |
transaction security, fault tolerance, Reliability, electronic commerce |
35 | Kazumasa Omote, Atsuko Miyaji |
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung |
Anonymity and Security Support for Persistent Enterprise Conversation. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
alias certificates, Anonymity, privacy protection, verifiability, anonymity revocation, cryptograph |
33 | Xin Zhao, Yuqin Lv, Wenxin He |
A Novel Micropayment Scheme with Complete Anonymity. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Dogan Kesdogan, Daniel Mölle, Stefan Richter 0001, Peter Rossmanith |
Breaking Anonymity by Learning a Unique Minimum Hitting Set. |
CSR |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Philippe Golle, Kurt Partridge |
On the Anonymity of Home/Work Location Pairs. |
Pervasive |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Lei Zhang 0004, Lingyu Wang 0001, Sushil Jajodia, Alexander Brodsky 0001 |
L-Cover: Preserving Diversity by Anonymity. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe |
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Dang Vinh Pham, Dogan Kesdogan |
A Combinatorial Approach for an Anonymity Metric. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Arik Friedman, Ran Wolff 0001, Assaf Schuster |
Providing k-anonymity in data mining. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jon McLachlan, Nicholas Hopper |
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Parvathinathan Venkitasubramaniam, Lang Tong |
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Mudhakar Srivatsa, Ling Liu 0001, Arun Iyengar |
Preserving Caller Anonymity in Voice-over-IP Networks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Aybek Mukhamedov, Mark Dermot Ryan |
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jianming Yong |
Enhancing the Privacy of e-Learning Systems with Alias and Anonymity. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
e-Learning, Privacy Preservation, Digital Identity |
33 | Xiaojun Ye, Zude Li, Yongnian Li |
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung |
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
group signatures, ring signatures, Anonymous authentication, X.509 certificates, traceable signatures |
Displaying result #101 - #200 of 3902 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|