Sciweavers

212 search results - page 30 / 43
» Anonymity and k-Choice Identities
Sort
View
STACS
2001
Springer
13 years 12 months ago
Gathering of Asynchronous Oblivious Robots with Limited Visibility
Abstract. We consider a collection of robots which are identical (anonymous), have limited visibility of the environment, and no memory of the past (oblivious); furthermore, they a...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...
ACISP
2009
Springer
14 years 2 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
AVSS
2009
IEEE
14 years 2 months ago
Object-Video Streams for Preserving Privacy in Video Surveillance
—This paper presents a framework for preserving privacy in video surveillance. Raw video is decomposed into a background and one or more object-video streams. Objectvideo streams...
Faisal Z. Qureshi
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
ECR
2010
129views more  ECR 2010»
13 years 7 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...