The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anonymity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1994 (20) 1995-1996 (18) 1997-1998 (39) 1999 (39) 2000 (48) 2001 (51) 2002 (58) 2003 (92) 2004 (142) 2005 (192) 2006 (242) 2007 (254) 2008 (312) 2009 (275) 2010 (134) 2011 (132) 2012 (120) 2013 (136) 2014 (121) 2015 (144) 2016 (199) 2017 (278) 2018 (163) 2019 (180) 2020 (176) 2021 (103) 2022 (103) 2023 (109) 2024 (22)
Publication types (Num. hits)
article(1163) book(1) incollection(47) inproceedings(2632) phdthesis(46) proceedings(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2203 occurrences of 764 keywords

Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Threshold Ring Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature
18Joseph K. Liu, Duncan S. Wong On the Security Models of (Threshold) Ring Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anonymity, Security Models, Bilinear Maps, Ring Signature
18Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM
18Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth 0002 Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mobile agent protection, Mobile Agent Secure Hub, macro-level issues, anonymity, reputation, accountability, Trusted Third Party
18Alfred Kobsa, Jörg Schreck Privacy through pseudonymity in user-adaptive systems. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Chaum mix, security, privacy, access control, personalization, User modeling, anonymity, encryption, reference model, pseudonymity, secrecy, personal information, KQML, user-adaptive systems
18Jiejun Kong, Xiaoyan Hong ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. Search on Bibsonomy MobiHoc The full citation details ... 2003 DBLP  DOI  BibTeX  RDF trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability
18George Danezis, Len Sassaman Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, mix networks, flooding attacks
18Giuseppe Ateniese, Breno de Medeiros Efficient Group Signatures without Trapdoors. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy and anonymity, cryptographic protocols, Group signatures
18Stelvio Cimato, Paolo D'Arco, Ivan Visconti Anonymous Group Communication in Mobile Networks. Search on Bibsonomy ICTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Privacy, Cryptography, Anonymity, Mobile Communication
18Mansour A. Al-Meaither, Chris J. Mitchell A Secure Electronic Payment Scheme for Charity Donations. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, smart cards, payment systems, e-commerce security, charity
18Jianhong Zhang, Qianhong Wu, Yumin Wang A Novel Efficient Group Signature Scheme with Forward Security. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, revocation, forward security, unlinkability, Group signature scheme
18Marc Rennhard, Bernhard Plattner Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. Search on Bibsonomy WPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collusion detection, anonymity, peer-to-peer systems, mix networks
18Thomas Demuth A Passive Attack on the Privacy of Web Users Using Standard Log Information. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF user tracking and profiling, server logs, privacy, World Wide Web, anonymity
18Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya Spending Offline Divisible Coins with Combining Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Offline divisible coins, Combining capability, Combined coin, Overspending prevention, Anonymity, Efficiency
18Jan Camenisch, Anna Lysyanskaya Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators
18Éliane Jaulmes, Guillaume Poupard On the Security of Homage Group Authentication Protocol. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF group authentication, Anonymity, cryptanalysis
18Rüdiger Grimm Security requirements for internet voting. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorization and anonymity, security requirements, blind signature, internet voting
18Toru Nakanishi 0001, Yuji Sugiyama Anonymous Statistical Survey of Attributes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Statistical survey of attributes, Anonymity, Shuffle, Group signature scheme, Threshold cryptosystem
18Birgit Pfitzmann, Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital coin, anonymity, fingerprinting, restrictiveness
18Andreas Bartelt, Winfried Lamersdorf Agent-Oriented Concepts to Foster the Automation of E-Business. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF e-business automation, interorganizational business processes, dynamic interoperability, business partner trust, graded anonymity, electronic commerce, automated negotiation, agent technology
18Jihong Wang, Jianping Hu, Kai Hu Security Design of Mobile Agent System. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF agent-based distributed computing, Unigent system, anonymity, heterogeneity, distributed programming, mobile agent system, network nodes, security design
18Joachim Biskup, Ulrich Flegel Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity
18Reihaneh Safavi-Naini, Yejing Wang Anonymous Traceability Schemes with Unconditional Security. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF traceability schemes, anonymity, unlinkability, authentication codes, Digital fingerprint
18Michael A. Schneider, Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad
18Kai Rannenberg, Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity
18Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer On secure and pseudonymous client-relationships with multiple servers. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym
18Ari Juels Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF blind digital signatures, coin tracing, trustee-based coin tracing, anonymity, e-cash, digital cash
18Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink Anonymous Authentication of Membership in Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF key replacement, verifiably common secret encoding, authentication, anonymity, identification
18Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 Pseudonym Systems. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability
18Josep Domingo-Ferrer, Jordi Herrera-Joancomartí An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF security and electronic payment, anonymity, electronic commerce, intelligent agents, untraceability
18Jan Camenisch, Markus Michels A Group Signature Scheme with Improved Efficiency. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Group signature scheme for large groups, revocable anonymity, digital signature schemes
18Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Secure and Efficient Digital Coins. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS
18Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley Achieving User Privacy in Mobile Networks. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements
18Michael G. Reed, Paul F. Syverson, David M. Goldschlag Proxies For Anonymous Routing. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity
18Volker Barent, Helmut Krcmar, Henrik Lewe, Gerhard Schwabe Improving continuous improvement with CATeam: lessons from a longitudinal case study. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF CATeam, Hohenheim Computer Aided Team, continuous improvement process, case descriptions, managerial issues, groupware, anonymity, organization, voting, business data processing, teleconferencing, office automation, organizational change, continuous improvement, longitudinal case study
18Carol J. Orwant EPER ethics. Search on Bibsonomy Ethics in Computer Age The full citation details ... 1994 DBLP  DOI  BibTeX  RDF epers, privacy, agents, anonymity, ethics, accountability, rights
18R. K. Shyamasundar, James W. Thatcher Language Constructs for Specifying Concurrency in CDL*. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF CDL* concurrency specification, dynamically allocating resources, CDL*, distributed programming languages, parallel programming, data integrity, data integrity, anonymity, specification languages, mutual exclusion, expressiveness, specification techniques, modular specification, language constructs, abstraction mechanisms, dynamic resource management
14Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari A practice-oriented framework for measuring privacy and utility in data sanitization systems. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
14Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino Private record matching using differential privacy. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, privacy, differential privacy, record matching
14Shlomi Dolev, Marina Kopeetsky Anonymous Transactions in Computer Networks. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Cecilia M. Procopiuc, Divesh Srivastava Efficient Table Anonymization for Aggregate Query Answering. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Keita Emura, Atsuko Miyaji, Kazumasa Omote A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Kohei Tatara, Kouichi Sakurai A Signature Scheme Associated with Universal Re-signcryption. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Konstantinos Chatzikokolakis 0001, Gethin Norman, David Parker 0001 Bisimulation for Demonic Schedulers. Search on Bibsonomy FoSSaCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Sin-Hwa Kang, Jonathan Gratch Interactants' Most Intimate Self-disclosure in Interactions with Virtual Humans. Search on Bibsonomy IVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14SeongHan Shin, Kazukuni Kobara, Hideki Imai Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray A multi-objective approach to data sharing with privacy constraints and preference based objectives. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymization bias, multi-objective optimization, constraint handling, disclosure control
14Kirstie Hawkey Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Justin Manweiler, Ryan Scudellari, Zachary Cancio, Landon P. Cox We saw each other on the subway: secure, anonymous proximity-based missed connections. Search on Bibsonomy HotMobile The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 Universal Designated Verifier Signatures with Threshold-Signers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mingqiang Xue, Panos Kalnis, Hung Keng Pung Location Diversity: Enhanced Privacy Protection in Location Based Services. Search on Bibsonomy LoCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Ali Khoshgozaran, Cyrus Shahabi Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services. Search on Bibsonomy Privacy in Location-Based Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso The Wisdom of Crowds: Attacks and Optimal Constructions. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Georg Fuchsbauer, David Pointcheval, Damien Vergnaud Transferable Constant-Size Fair E-Cash. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang Anonymizing moving objects: how to hide a MOB in a crowd? Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mike Burmester, Breno de Medeiros, Rossana Motta Robust, anonymous RFID authentication with constant key-lookup. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure protocols, privacy, scalability, RFID, availability, unlinkability
14Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung Fair Traceable Multi-Group Signatures. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto An Efficient Anonymous Credential System. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jianzhong Li 0001, Beng Chin Ooi, Weiping Wang 0001 Anonymizing Streaming Data for Privacy Protection. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Aristides Gionis, Arnon Mazza, Tamir Tassa k-Anonymization Revisited. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Andriy Panchenko 0001, Lexi Pimenidis, Johannes Renner Performance Analysis of Anonymous Communication Channels Provided by Tor. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Anonymous Communication, TOR, Onion Routing
14Jun-Lin Lin, Meng-Cheng Wei, Chih-Wen Li, Kuo-Chiang Hsieh A Hybrid Method for k-Anonymization. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski TrustMAS: Trusted Communication Platform for Multi-Agent Systems. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi agents systems, steganography, information hiding
14Chengyu Fan, Shijie Zhou, Fagen Li Deniable Proxy-Anonymous Signatures. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin Rethinking accountable privacy supporting services: extended abstract. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems
14Hatim Daginawala, Matthew K. Wright Studying Timing Analysis on the Internet with SubRosa. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Xuanwu Zhou, Ping Wei 0005 Anonymous Proxy Authorization Signature Scheme with Forward Security. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sumit Chakraborty, Sushil K. Sharma, Asim Kumar Pal Privacy-Preserving 1-n-p Negotiation Protocol. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Richard Au, Peter R. Croll Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Alireza Sadighian, Rasool Jalili FLMAP: A fast lightweight mutual authentication protocol for RFID systems. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Minh-Triet Tran, Trung Thanh Nguyen 0005, Isao Echizen Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Rhonda Chaytor, Patricia A. Evans, Todd Wareham Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries. Search on Bibsonomy COCOA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Hakem Beitollahi, Geert Deconinck Dependable Overlay Networks. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Bharath Krishnamachari, Gabriel Ghinita, Panos Kalnis Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. Search on Bibsonomy SSDBM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mina Deng, Bart Preneel On Secure and Anonymous Buyer-Seller Watermarking Protocol. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking protocol, multimedia, e-commerce, security and privacy
14Min-Hua Shao, Shin-Jia Huang Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Tanzima Hashem, Lars Kulik Safeguarding Location Privacy in Wireless Ad-Hoc Networks. Search on Bibsonomy UbiComp The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Aggelos Kiayias, Hong-Sheng Zhou Hidden Identity-Based Signatures. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Orhan Cetinkaya, Ali Doganaksoy Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Weijia Yang, Shangteng Huang k -Anonymization Without Q-S Associations. Search on Bibsonomy APWeb/WAIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Patrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu Privacy-Preserving Data Mining through Knowledge Model Sharing. Search on Bibsonomy PinKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Changji Wang, Qin Li 0009, Xingfeng Yang A Fair and Transferable Off-line Electronic Cash System with Multiple Banks. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Eiichiro Fujisaki, Koutarou Suzuki Traceable Ring Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
14Aaron Harwood, Santosh Kulkani Delay sensitive identity protection in peer-to-peer online gaming environments. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Cheng-Kang Chu, Wen-Guey Tzeng Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous signatures, group signatures, ring signatures
14Aniket Kate, Gregory M. Zaverucha, Ian Goldberg Pairing-Based Onion Routing. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen Certificate Based (Linkable) Ring Signature. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificate Based, Ring Signature, Linkability
14Xuanwu Zhou, Xiaoyuan Yang 0002, Ping Wei 0005, Yupu Hu BSADF: Blind Signature Based Anonymous Digital Fingerprint. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jong Sik Moon, Im-Yeong Lee A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OTP, Authentication, Ubiquitous, AAA, Ticket
14Azzedine Boukerche, Yonglin Ren, Zhenxia Zhang Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Christine Laurendeau, Michel Barbeau Secure Anonymous Broadcasting in Vehicular Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Tingting Chen, Sheng Zhong 0002 Enhancing Privacy of Released Database. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Byung Ryong Kim, Ki-Chang Kim Packet Manipulating Based on Zipf's Distribution to Protect from Attack in P2P Information Retrieval. Search on Bibsonomy Advances in Web Intelligence and Data Mining The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich How to win the clonewars: efficient periodic n-times anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-anonymous authentication, credentials, clone detection
14Olivier Verscheure, Michail Vlachos, Aris Anagnostopoulos, Pascal Frossard, Eric Bouillet, Philip S. Yu Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Zhouxuan Teng, Wenliang Du Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Vincent Naessens, Bart De Decker A Methodology for Designing Controlled Anonymous Applications. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 3902 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license