Sciweavers

212 search results - page 11 / 43
» Anonymity and k-Choice Identities
Sort
View
CSI
2008
68views more  CSI 2008»
13 years 7 months ago
Privacy and forensics investigation process: The ERPINA protocol
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allow...
Giannakis Antoniou, Leon Sterling, Stefanos Gritza...
JCS
2006
113views more  JCS 2006»
13 years 7 months ago
Blind Electronic Commerce
Privacy in Electronic Commerce transactions is the subject of ever increasing research. However, many challenges remain to be overcome. For example, let us consider a customer, Si...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
ETRICS
2006
13 years 11 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
JPDC
2011
131views more  JPDC 2011»
13 years 2 months ago
Conditional e-payments with transferability
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are ...
Bogdan Carbunar, Weidong Shi, Radu Sion
ASIACRYPT
2010
Springer
13 years 5 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel