Sciweavers

239 search results - page 3 / 48
» Accountable Privacy
Sort
View
ACSAC
1998
IEEE
13 years 11 months ago
Electronic Submission Protocol Based on Temporal Accountability
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, an...
Michiharu Kudo
CCS
2010
ACM
13 years 7 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 7 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...
CCS
2010
ACM
13 years 7 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
CCS
2000
ACM
13 years 11 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa