|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
18 | Joseph K. Liu, Duncan S. Wong |
On the Security Models of (Threshold) Ring Signature Schemes. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Anonymity, Security Models, Bilinear Maps, Ring Signature |
18 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
18 | Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth 0002 |
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Mobile agent protection, Mobile Agent Secure Hub, macro-level issues, anonymity, reputation, accountability, Trusted Third Party |
18 | Alfred Kobsa, Jörg Schreck |
Privacy through pseudonymity in user-adaptive systems. |
ACM Trans. Internet Techn. |
2003 |
DBLP DOI BibTeX RDF |
Chaum mix, security, privacy, access control, personalization, User modeling, anonymity, encryption, reference model, pseudonymity, secrecy, personal information, KQML, user-adaptive systems |
18 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. |
MobiHoc |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
18 | George Danezis, Len Sassaman |
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
anonymity, mix networks, flooding attacks |
18 | Giuseppe Ateniese, Breno de Medeiros |
Efficient Group Signatures without Trapdoors. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
privacy and anonymity, cryptographic protocols, Group signatures |
18 | Stelvio Cimato, Paolo D'Arco, Ivan Visconti |
Anonymous Group Communication in Mobile Networks. |
ICTCS |
2003 |
DBLP DOI BibTeX RDF |
Privacy, Cryptography, Anonymity, Mobile Communication |
18 | Mansour A. Al-Meaither, Chris J. Mitchell |
A Secure Electronic Payment Scheme for Charity Donations. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
anonymity, smart cards, payment systems, e-commerce security, charity |
18 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A Novel Efficient Group Signature Scheme with Forward Security. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
anonymity, revocation, forward security, unlinkability, Group signature scheme |
18 | Marc Rennhard, Bernhard Plattner |
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
collusion detection, anonymity, peer-to-peer systems, mix networks |
18 | Thomas Demuth |
A Passive Attack on the Privacy of Web Users Using Standard Log Information. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
user tracking and profiling, server logs, privacy, World Wide Web, anonymity |
18 | Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya |
Spending Offline Divisible Coins with Combining Capability. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Offline divisible coins, Combining capability, Combined coin, Overspending prevention, Anonymity, Efficiency |
18 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
18 | Éliane Jaulmes, Guillaume Poupard |
On the Security of Homage Group Authentication Protocol. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
group authentication, Anonymity, cryptanalysis |
18 | Rüdiger Grimm |
Security requirements for internet voting. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
authorization and anonymity, security requirements, blind signature, internet voting |
18 | Toru Nakanishi 0001, Yuji Sugiyama |
Anonymous Statistical Survey of Attributes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Statistical survey of attributes, Anonymity, Shuffle, Group signature scheme, Threshold cryptosystem |
18 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
18 | Andreas Bartelt, Winfried Lamersdorf |
Agent-Oriented Concepts to Foster the Automation of E-Business. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
e-business automation, interorganizational business processes, dynamic interoperability, business partner trust, graded anonymity, electronic commerce, automated negotiation, agent technology |
18 | Jihong Wang, Jianping Hu, Kai Hu |
Security Design of Mobile Agent System. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
agent-based distributed computing, Unigent system, anonymity, heterogeneity, distributed programming, mobile agent system, network nodes, security design |
18 | Joachim Biskup, Ulrich Flegel |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity |
18 | Reihaneh Safavi-Naini, Yejing Wang |
Anonymous Traceability Schemes with Unconditional Security. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
traceability schemes, anonymity, unlinkability, authentication codes, Digital fingerprint |
18 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
18 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
18 | Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer |
On secure and pseudonymous client-relationships with multiple servers. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym |
18 | Ari Juels |
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
blind digital signatures, coin tracing, trustee-based coin tracing, anonymity, e-cash, digital cash |
18 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
18 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
18 | Josep Domingo-Ferrer, Jordi Herrera-Joancomartí |
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. |
SIGMOD Rec. |
1998 |
DBLP DOI BibTeX RDF |
security and electronic payment, anonymity, electronic commerce, intelligent agents, untraceability |
18 | Jan Camenisch, Markus Michels |
A Group Signature Scheme with Improved Efficiency. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
Group signature scheme for large groups, revocable anonymity, digital signature schemes |
18 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Secure and Efficient Digital Coins. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS |
18 | Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley |
Achieving User Privacy in Mobile Networks. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements |
18 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
18 | Volker Barent, Helmut Krcmar, Henrik Lewe, Gerhard Schwabe |
Improving continuous improvement with CATeam: lessons from a longitudinal case study. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
CATeam, Hohenheim Computer Aided Team, continuous improvement process, case descriptions, managerial issues, groupware, anonymity, organization, voting, business data processing, teleconferencing, office automation, organizational change, continuous improvement, longitudinal case study |
18 | Carol J. Orwant |
EPER ethics. |
Ethics in Computer Age |
1994 |
DBLP DOI BibTeX RDF |
epers, privacy, agents, anonymity, ethics, accountability, rights |
18 | R. K. Shyamasundar, James W. Thatcher |
Language Constructs for Specifying Concurrency in CDL*. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
CDL* concurrency specification, dynamically allocating resources, CDL*, distributed programming languages, parallel programming, data integrity, data integrity, anonymity, specification languages, mutual exclusion, expressiveness, specification techniques, modular specification, language constructs, abstraction mechanisms, dynamic resource management |
14 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari |
A practice-oriented framework for measuring privacy and utility in data sanitization systems. |
EDBT/ICDT Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino |
Private record matching using differential privacy. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
security, privacy, differential privacy, record matching |
14 | Shlomi Dolev, Marina Kopeetsky |
Anonymous Transactions in Computer Networks. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Cecilia M. Procopiuc, Divesh Srivastava |
Efficient Table Anonymization for Aggregate Query Answering. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Keita Emura, Atsuko Miyaji, Kazumasa Omote |
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Kohei Tatara, Kouichi Sakurai |
A Signature Scheme Associated with Universal Re-signcryption. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Konstantinos Chatzikokolakis 0001, Gethin Norman, David Parker 0001 |
Bisimulation for Demonic Schedulers. |
FoSSaCS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Sin-Hwa Kang, Jonathan Gratch |
Interactants' Most Intimate Self-disclosure in Interactions with Virtual Humans. |
IVA |
2009 |
DBLP DOI BibTeX RDF |
|
14 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan |
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray |
A multi-objective approach to data sharing with privacy constraints and preference based objectives. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
anonymization bias, multi-objective optimization, constraint handling, disclosure control |
14 | Kirstie Hawkey |
Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Justin Manweiler, Ryan Scudellari, Zachary Cancio, Landon P. Cox |
We saw each other on the subway: secure, anonymous proximity-based missed connections. |
HotMobile |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mingqiang Xue, Panos Kalnis, Hung Keng Pung |
Location Diversity: Enhanced Privacy Protection in Location Based Services. |
LoCA |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ali Khoshgozaran, Cyrus Shahabi |
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services. |
Privacy in Location-Based Applications |
2009 |
DBLP DOI BibTeX RDF |
|
14 | George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso |
The Wisdom of Crowds: Attacks and Optimal Constructions. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Georg Fuchsbauer, David Pointcheval, Damien Vergnaud |
Transferable Constant-Size Fair E-Cash. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang |
Anonymizing moving objects: how to hide a MOB in a crowd? |
EDBT |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Robust, anonymous RFID authentication with constant key-lookup. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
provably secure protocols, privacy, scalability, RFID, availability, unlinkability |
14 | Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung |
Fair Traceable Multi-Group Signatures. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jianzhong Li 0001, Beng Chin Ooi, Weiping Wang 0001 |
Anonymizing Streaming Data for Privacy Protection. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Aristides Gionis, Arnon Mazza, Tamir Tassa |
k-Anonymization Revisited. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Andriy Panchenko 0001, Lexi Pimenidis, Johannes Renner |
Performance Analysis of Anonymous Communication Channels Provided by Tor. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Anonymous Communication, TOR, Onion Routing |
14 | Jun-Lin Lin, Meng-Cheng Wei, Chih-Wen Li, Kuo-Chiang Hsieh |
A Hybrid Method for k-Anonymization. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski |
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
multi agents systems, steganography, information hiding |
14 | Chengyu Fan, Shijie Zhou, Fagen Li |
Deniable Proxy-Anonymous Signatures. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
14 | Hatim Daginawala, Matthew K. Wright |
Studying Timing Analysis on the Internet with SubRosa. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Sumit Chakraborty, Sushil K. Sharma, Asim Kumar Pal |
Privacy-Preserving 1-n-p Negotiation Protocol. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Richard Au, Peter R. Croll |
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Alireza Sadighian, Rasool Jalili |
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Minh-Triet Tran, Trung Thanh Nguyen 0005, Isao Echizen |
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Rhonda Chaytor, Patricia A. Evans, Todd Wareham |
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries. |
COCOA |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Hakem Beitollahi, Geert Deconinck |
Dependable Overlay Networks. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Bharath Krishnamachari, Gabriel Ghinita, Panos Kalnis |
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. |
SSDBM |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mina Deng, Bart Preneel |
On Secure and Anonymous Buyer-Seller Watermarking Protocol. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
watermarking protocol, multimedia, e-commerce, security and privacy |
14 | Min-Hua Shao, Shin-Jia Huang |
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks. |
PDCAT |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Tanzima Hashem, Lars Kulik |
Safeguarding Location Privacy in Wireless Ad-Hoc Networks. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Aggelos Kiayias, Hong-Sheng Zhou |
Hidden Identity-Based Signatures. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Weijia Yang, Shangteng Huang |
k -Anonymization Without Q-S Associations. |
APWeb/WAIM |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Patrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu |
Privacy-Preserving Data Mining through Knowledge Model Sharing. |
PinKDD |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Changji Wang, Qin Li 0009, Xingfeng Yang |
A Fair and Transferable Off-line Electronic Cash System with Multiple Banks. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Eiichiro Fujisaki, Koutarou Suzuki |
Traceable Ring Signature. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
14 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
14 | Aaron Harwood, Santosh Kulkani |
Delay sensitive identity protection in peer-to-peer online gaming environments. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
14 | Aniket Kate, Gregory M. Zaverucha, Ian Goldberg |
Pairing-Based Onion Routing. |
Privacy Enhancing Technologies |
2007 |
DBLP DOI BibTeX RDF |
|
14 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Certificate Based (Linkable) Ring Signature. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Certificate Based, Ring Signature, Linkability |
14 | Xuanwu Zhou, Xiaoyuan Yang 0002, Ping Wei 0005, Yupu Hu |
BSADF: Blind Signature Based Anonymous Digital Fingerprint. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jong Sik Moon, Im-Yeong Lee |
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
OTP, Authentication, Ubiquitous, AAA, Ticket |
14 | Azzedine Boukerche, Yonglin Ren, Zhenxia Zhang |
Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Christine Laurendeau, Michel Barbeau |
Secure Anonymous Broadcasting in Vehicular Networks. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Tingting Chen, Sheng Zhong 0002 |
Enhancing Privacy of Released Database. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Byung Ryong Kim, Ki-Chang Kim |
Packet Manipulating Based on Zipf's Distribution to Protect from Attack in P2P Information Retrieval. |
Advances in Web Intelligence and Data Mining |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
How to win the clonewars: efficient periodic n-times anonymous authentication. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
n-anonymous authentication, credentials, clone detection |
14 | Olivier Verscheure, Michail Vlachos, Aris Anagnostopoulos, Pascal Frossard, Eric Bouillet, Philip S. Yu |
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Zhouxuan Teng, Wenliang Du |
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Vincent Naessens, Bart De Decker |
A Methodology for Designing Controlled Anonymous Applications. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 3902 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|