Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Ye Zhu 0001, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
flow-correlation attack, Privacy, anonymity, anonymous communication, mixes |
23 | Slava Kisilevich, Lior Rokach, Yuval Elovici, Bracha Shapira |
Efficient Multidimensional Suppression for K-Anonymity. |
IEEE Trans. Knowl. Data Eng. |
2010 |
DBLP DOI BibTeX RDF |
deindentified data, decision trees, k-anonymity, Privacy-preserving data mining |
23 | Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris Papadias |
k-Anonymity in the Presence of External Databases. |
IEEE Trans. Knowl. Data Eng. |
2010 |
DBLP DOI BibTeX RDF |
Privacy, k-anonymity |
23 | Neil Zhenqiang Gong, Guangzhong Sun, Xing Xie 0001 |
Protecting Privacy in Location-Based Services Using K-Anonymity without Cloaked Region. |
Mobile Data Management |
2010 |
DBLP DOI BibTeX RDF |
privacy, location-based services, K-anonymity |
23 | André Miede, Ulrich Lampe, Dieter Schuller, Julian Eckert, Ralf Steinmetz |
Evaluating the QoS Impact of Web Service Anonymity. |
ECOWS |
2010 |
DBLP DOI BibTeX RDF |
Security, Quality of Service, Web Services, Anonymity |
23 | Jia Zhang 0004, Hai-Xin Duan, Wu Liu, Jianping Wu |
Analysis of Anonymity in P2P Anonymous Communication Systems. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Anonymity Analysis, Peer-to-Peer, Network Security, Anonymous Communications |
23 | Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura |
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
privacy, metric, anonymity, online social network |
23 | Davide Alessio, Marc Joye |
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
anonymity, public-key encryption, key-privacy |
23 | Chin-Chen Chang 0001, Chia-Yin Lee, Wei-Bin Lee |
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
authentication, Anonymity, wireless communications, roaming |
23 | Gerardo Canfora, Corrado Aaron Visaggio |
Does enforcing anonymity mean decreasing data usefulness? |
QoP |
2008 |
DBLP DOI BibTeX RDF |
data usefulness, anonymity, data privacy |
23 | Qiong Wei, Yansheng Lu, Qiang Lou |
(t, lambda)-Uniqueness: Anonymity Management for Data Publication. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Anonymity Management, data publication |
23 | Alina Campan, Traian Marius Truta |
Data and Structural k-Anonymity in Social Networks. |
PinKDD |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Social Networks, K-Anonymity, Information Loss |
23 | Yong Zhang, Jianfeng Yin, Benyang Dai |
A Blocking-Resistant Method for Anonymity System Based on Proxy and Data Hiding. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Anonymity System, Blocking Resistant, Proxy, Data Hiding |
23 | Jacek Cichon, Miroslaw Kutylowski |
Anonymity and k-Choice Identities. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
anonymity set, two-choice paradigm, identifier, birthday paradox |
23 | Azzedine Boukerche, Yonglin Ren |
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
mobile agent, anonymity, wireless ad hoc network, secure protocol, wireless security |
23 | Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright |
Anonymity-preserving data collection. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
data mining, anonymity, data collection |
23 | Antti Vaha-Sipila, Teemupekka Virtanen |
BT-Crowds: Crowds-Style Anonymity with Bluetooth and Java. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
Privacy, Anonymity, Bluetooth, PAN |
23 | Poppy L. McLeod |
A comprehensive model of anonymity in computer-supported group decision making. |
ICIS |
1997 |
DBLP BibTeX RDF |
anonymity, group support systems |
21 | Chengyang Zhang, Yan Huang 0002 |
Cloaking locations for anonymous location based services: a hybrid approach. |
GeoInformatica |
2009 |
DBLP DOI BibTeX RDF |
Spatial cloaking, Location based service, Location privacy |
21 | Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Mohammad Tanviruzzaman |
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Mafruz Zaman Ashrafi, See-Kiong Ng |
Efficient and Anonymous Online Data Collection. |
DASFAA |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
On the comparison of microdata disclosure control algorithms. |
EDBT |
2009 |
DBLP DOI BibTeX RDF |
anonymization bias, performance evaluation, data privacy |
21 | Li Lu 0001, Jinsong Han, Yunhao Liu 0001, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma |
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei |
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Charu C. Aggarwal |
On Unifying Privacy and Uncertain Data Models. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jian Ren 0001, Tongtong Li, Keesook Han |
Anonymous Communication Protocol in Overlay Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Keith B. Frikken, Yihua Zhang |
Yet another privacy metric for publishing micro-data. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
privacy, generalization, data publishing |
21 | Igor Margasinski, Michal Pióro |
Low-Latency Parallel Transport in Anonymous Peer-to-Peer Overlays. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
overlay networks management, privacy, communication system security, peer-to-peer overlays, Communication system traffic |
21 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
21 | T. Rajendran, K. V. Sreenaath |
Secure anonymous routing in ad hoc networks. |
Bangalore Compute Conf. |
2008 |
DBLP DOI BibTeX RDF |
anonymous routing, ad-hoc network |
21 | Elli Androulaki, Mariana Raykova 0001, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin |
PAR: Payment for Anonymous Routing. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Alejandro Hevia, Daniele Micciancio |
An Indistinguishability-Based Characterization of Anonymous Channels. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ofer Hermoni, Niv Gilboa, Eyal Felstaine, Sharon Shitrit |
Deniability - an alibi for users in P2P networks. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Igor Margasinski, Michal Pióro |
A Concept of an Anonymous Direct P2P Distribution Overlay System. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
privacy, communication system security, communication system traffic |
21 | Stefan Böttcher, Sebastian Obermeier 0001 |
Secure Anonymous Union Computation Among Malicious Partners. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Aaron Johnson 0001, Paul F. Syverson |
Probabilistic analysis of onion routing in a black-box model. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
anonmity, tor, onion routing |
21 | Rhonda Chaytor |
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework. |
PinKDD |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jung-Chun Kao, Radu Marculescu |
Energy-efficient anonymous multicast in mobile ad-hoc networks. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Sébastien Canard, Aline Gouget |
Divisible E-Cash Systems Can Be Truly Anonymous. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Chunum Kong, Min Young Chung, Hyunseung Choo |
Session Key Reuse Scheme to Improve Routing Efficiency in AnonDSR. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Anonymous Ad Hoc Routing, Key Reuse and Onion |
21 | Souvik Ray, Zhao Zhang |
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables. |
Peer-to-Peer Computing |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Ali Khoshgozaran, Cyrus Shahabi |
Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. |
SSTD |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos |
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries. |
SSTD |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Thomas S. Heydt-Benjamin, Andrei Serjantov, Benessa Defend |
Nonesuch: a mix network with sender unobservability. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
minx packet format, oblivious channels, sender unobservability, steganography, public key, mix networks |
21 | Sebastian Clauß |
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. |
SPC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang |
Anonymous Signature Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jin Li 0002, Xiaofeng Chen 0001, Tsz Hon Yuen, Yanming Wang |
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
k-Anonymous Patterns. |
PKDD |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zhaofeng Ma, Xibin Zhao, Zhi Guo, Ming Gu 0001, Jiaguang Sun 0001 |
Secure Anonymous Communication with Conditional Traceability. |
NPC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Makoto Yokoo, Vincent Conitzer, Tuomas Sandholm, Naoki Ohta, Atsushi Iwasaki |
A New Solution Concept for Coalitional Games in Open Anonymous Environments. |
JSAI Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yanchao Zhang, Wei Liu 0008, Wenjing Lou |
Anonymous communications in mobile ad hoc networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Andrei Serjantov, Steven J. Murdoch |
Message Splitting Against the Partial Adversary. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Nikita Borisov |
An Analysis of Parallel Mixing with Attacker-Controlled Inputs. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Byung Ryong Kim, Ki-Chang Kim |
Anonymous Communication Systems in P2P Network with Random Agent Nodes. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
Local View Attack on Anonymous Communication. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis, Jolyon Clulow |
Compulsion Resistant Anonymous Communications. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 |
A quantitative analysis of anonymous communications. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Makoto Iguchi, Masayuki Terada, Ko Fujimura |
Managing Resource and Servent Reputation in P2P Networks. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jan Camenisch, Jens Groth |
Group Signatures: Better Efficiency and New Theoretical Aspects. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba |
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Keon-Myung Lee, Sang Ho Lee 0002 |
A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jinqiao Shi, Binxing Fang, Bin Li |
Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Managing and Sharing Servents' Reputations in P2P Systems. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
polling protocol, reputation, credibility, P2P network |
21 | Masayuki Abe, Hideki Imai |
Flaws in Some Robust Optimistic Mix-Nets. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis, Roger Dingledine, Nick Mathewson |
Mixminion: Design of a Type III Anonymous Remailer Protocol. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Yan Xie, Fangguo Zhang, Xiaofeng Chen 0001, Kwangjo Kim |
ID-Based Distributed "Magic Ink" Signature from Pairings. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Choosing reputable servents in a P2P network. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
polling protocol, reputation, credibility, P2P network |
21 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
Unconditionally Secure Anonymous Encryption and Group Authentication. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Oliver Berthold, Heinrich Langos |
Dummy Traffic against Long Term Intersection Attacks. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan |
P5: A Protocol for Scalable Anonymous Communication. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
security, privacy, network, anonymous |
21 | Andrei Serjantov, Roger Dingledine, Paul F. Syverson |
From a Trickle to a Flood: Active Attacks on Several Mix Types. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Masayuki Abe, Miyako Ohkubo |
Provably Secure Fair Blind Signatures with Tight Revocation. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Shlomi Dolev, Rafail Ostrovsky |
Xor-trees for efficient anonymous multicast and reception. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
anonymous multicast, anonymous communication |
19 | |
p-Sensitive k-Anonymity. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
19 | |
Anonymity in Location-based Services. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
19 | |
Spatial k-Anonymity. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Lijian Lu, Xiaojun Ye |
An Improved Weighted-Feature Clustering Algorithm for K-anonymity. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Haibo Hu 0001, Jianliang Xu |
Non-Exposure Location Anonymity. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Matt Smart, Eike Ritter |
Remote Electronic Voting with Revocable Anonymity. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi |
The k-Anonymity Problem Is Hard. |
FCT |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stefan Schiffner, Sebastian Clauß |
Using Linkability Information to Attack Mix-Based Anonymity Services. |
Privacy Enhancing Technologies |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Kar Way Tan, Yimin Lin, Kyriakos Mouratidis |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity. |
SSTD |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Bowonsak Seisungsittisunti, Juggapong Natwichai |
Incremental privacy preservation for associative classification. |
CIKM-PAVLAD |
2009 |
DBLP DOI BibTeX RDF |
privacy-preservation, associative classification, incremental processing |
19 | Mina Deng, Bart Preneel |
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Information Hiding and Watermarking, E-commerce, Applied Cryptography |
19 | Changji Wang, Rongbo Lu |
An ID-based Transferable Off-line E-Cash System with Revokable Anonymity. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Transferable E-Cash, Group Signature, Restrictive Partially Blind Signature |
19 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
On the Optimal Selection of k in the k-Anonymity Problem. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Xiaojun Ye, Yawei Zhang, Ming Liu |
A Personalized (a, k)-Anonymity Model. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
Compromising Anonymity Using Packet Spinning. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Böttcher, Bernhard Kauer, Hermann Härtig |
Trusted Computing Serving an Anonymity Service. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Malika Izabachène, David Pointcheval |
New Anonymity Notions for Identity-Based Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Slamanig, Christian Stingl, Christian Menard, Martina Heiligenbrunner, Jürgen Thierry |
Anonymity and Application Privacy in Context of Mobile Computing in eHealth. |
Mobile Response |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Benjamin C. M. Fung, Ke Wang 0001, Ada Wai-Chee Fu, Jian Pei |
Anonymity for continuous data publishing. |
EDBT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hua Zhu, Xiaojun Ye |
Achieving k -Anonymity Via a Density-Based Clustering Method. |
APWeb/WAIM |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Claudio Bettini, Sushil Jajodia, Linda Pareschi |
Anonymity and Diversity in LBS: A Preliminary Investigation. |
PerCom Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Eun-Jun Yoon, Kee-Young Yoo |
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chengyu Hu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei |
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chengyu Hu, Pengtao Liu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. |
MCAM |
2007 |
DBLP DOI BibTeX RDF |
|