Sciweavers

212 search results - page 36 / 43
» Anonymity and k-Choice Identities
Sort
View
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 8 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
14 years 27 days ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
ISW
2005
Springer
14 years 29 days ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 16 hour ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
WETICE
2009
IEEE
14 years 2 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...