Sciweavers

134 search results - page 15 / 27
» Attack for Flash MIX
Sort
View
EUC
2005
Springer
14 years 2 months ago
A Survey of Anonymous Peer-to-Peer File-Sharing
Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
Tom Chothia, Konstantinos Chatzikokolakis
ESORICS
2003
Springer
14 years 1 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
PVM
2005
Springer
14 years 2 months ago
Cooperative Write-Behind Data Buffering for MPI I/O
Many large-scale production parallel programs often run for a very long time and require data checkpoint periodically to save the state of the computation for program restart and/o...
Wei-keng Liao, Kenin Coloma, Alok N. Choudhary, Le...
ESORICS
2007
Springer
14 years 14 days ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
PST
2008
13 years 10 months ago
Unlinkable Communication
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...