Sciweavers

480 search results - page 24 / 96
» Anonymous Transactions in Computer Networks
Sort
View
CLUSTER
2007
IEEE
13 years 8 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi
P2P
2003
IEEE
100views Communications» more  P2P 2003»
14 years 1 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 8 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 5 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
JDCTA
2010
139views more  JDCTA 2010»
13 years 3 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh