Sciweavers

480 search results - page 11 / 96
» Anonymous Transactions in Computer Networks
Sort
View
LCN
2006
IEEE
14 years 2 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang
ICPADS
2007
IEEE
14 years 2 months ago
Energy-efficient anonymous multicast in mobile ad-hoc networks
Protecting personal privacy and energy efficiency are two primary concerns for mobile ad hoc networks. However, no energy-efficient multicast algorithm designed for preserving ano...
Jung-Chun Kao, Radu Marculescu
LCN
2007
IEEE
14 years 2 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
NDSS
2002
IEEE
14 years 1 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
PODC
2006
ACM
14 years 2 months ago
Stably computable predicates are semilinear
We consider the model of population protocols introduced by Angluin et al. [2], in which anonymous finite-state agents stably compute a predicate of their inputs via twoway inter...
Dana Angluin, James Aspnes, David Eisenstat