Sciweavers

402 search results - page 39 / 81
» Achieving privacy in mesh networks
Sort
View
CORR
2002
Springer
98views Education» more  CORR 2002»
13 years 7 months ago
Fast optical layer mesh protection using pre-cross-connected trails
Conventional optical networks are based on SONET rings, but since rings are known to use bandwidth inefficiently, there has been much research into shared mesh protection, which pr...
Timothy Y. Chow, Fabián A. Chudak, Anthony ...
ESORICS
2000
Springer
13 years 11 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
PERCOM
2009
ACM
14 years 8 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
NDSS
2007
IEEE
14 years 2 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters
AINA
2006
IEEE
14 years 1 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi