Sciweavers

212 search results - page 14 / 43
» Anonymity and k-Choice Identities
Sort
View
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
14 years 1 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 7 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
ICPADS
2005
IEEE
14 years 1 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
P2P
2003
IEEE
100views Communications» more  P2P 2003»
14 years 22 days ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
ISW
2007
Springer
14 years 1 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo