Sciweavers

212 search results - page 20 / 43
» Anonymity and k-Choice Identities
Sort
View
CCR
2010
104views more  CCR 2010»
13 years 4 months ago
I know what you will do next summer
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how...
Balachander Krishnamurthy
WWW
2007
ACM
14 years 8 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
INFOCOM
2005
IEEE
14 years 1 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
INFOCOM
2007
IEEE
14 years 1 months ago
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC
—Known covert channel based on splitting algorithms in Medium Access Control (MAC) protocols requires the receiver’s knowledge of the sender’s identity. In this paper we pres...
Zhenghong Wang, Jing Deng, Ruby B. Lee
WDAG
2004
Springer
103views Algorithms» more  WDAG 2004»
14 years 25 days ago
Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems
We study the power of reliable anonymous distributed systems, where processes do not fail, do not have identifiers, and run identical programmes. We are interested specifically i...
James Aspnes, Faith Ellen Fich, Eric Ruppert