Sciweavers

212 search results - page 27 / 43
» Anonymity and k-Choice Identities
Sort
View
DIM
2007
ACM
13 years 11 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 9 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
FC
2007
Springer
151views Cryptology» more  FC 2007»
14 years 1 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion
DIAU
2000
Springer
13 years 12 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
14 years 2 months ago
Mutual localization in a multi-robot system with anonymous relative position measures
— We address the mutual localization problem for a multi-robot system, under the assumption that each robot is equipped with a sensor that provides a measure of the relative posi...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno