Sciweavers

480 search results - page 7 / 96
» Anonymous Transactions in Computer Networks
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi
IJNSEC
2011
110views more  IJNSEC 2011»
13 years 3 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao
CERA
2004
89views more  CERA 2004»
13 years 8 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
TDSC
2011
13 years 3 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
WDAG
2001
Springer
76views Algorithms» more  WDAG 2001»
14 years 1 months ago
An Effective Characterization of Computability in Anonymous Networks
We provide effective (i.e., recursive) characterizations of the relations that can be computed on networks where all processors use the same algorithm, start from the same state, a...
Paolo Boldi, Sebastiano Vigna