Sciweavers

212 search results - page 3 / 43
» Anonymity and k-Choice Identities
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
CSE
2009
IEEE
13 years 5 months ago
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshi...
PET
2012
Springer
11 years 10 months ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
INFOCOM
2010
IEEE
13 years 5 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
13 years 11 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner