Sciweavers

212 search results - page 25 / 43
» Anonymity and k-Choice Identities
Sort
View
CMS
2006
110views Communications» more  CMS 2006»
13 years 9 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
JSS
2002
96views more  JSS 2002»
13 years 7 months ago
A group signature scheme with strong separability
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. Only a designated group manager is able to iden...
Shundong Xia, Jinyuan You
PERCOM
2010
ACM
13 years 5 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
INFOCOM
2007
IEEE
14 years 1 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
PERVASIVE
2009
Springer
14 years 2 months ago
On the Anonymity of Home/Work Location Pairs
Abstract. Many applications benefit from user location data, but location data raises privacy concerns. Anonymization can protect privacy, but identities can sometimes be inferred...
Philippe Golle, Kurt Partridge