Sciweavers

49 search results - page 7 / 10
» Anonymity-Enhanced Pseudonym System
Sort
View
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
WECWIS
2005
IEEE
87views ECommerce» more  WECWIS 2005»
14 years 2 months ago
TrustDavis: A Non-Exploitable Online Reputation System
We present TrustDavis, an online reputation system that provides insurance against trade fraud by leveraging existing relationships between players, such as the ones present in so...
Dimitri do B. DeFigueiredo, Earl T. Barr
CSCW
2012
ACM
12 years 4 months ago
Boundary regulation in social media
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
Stutzman Frederic, Hartzog Woodrow
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
PET
2007
Springer
14 years 2 months ago
Attacking Unlinkability: The Importance of Context
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information t...
Matthias Franz, Bernd Meyer, Andreas Pashalidis