Sciweavers

39 search results - page 6 / 8
» Bifrost : A Novel Anonymous Communication System with DHT
Sort
View
CCS
2009
ACM
14 years 2 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
FC
1998
Springer
134views Cryptology» more  FC 1998»
13 years 11 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
DASFAA
2006
IEEE
220views Database» more  DASFAA 2006»
14 years 1 months ago
KEYNOTE: Keyword Search by Node Selection for Text Retrieval on DHT-Based P2P Networks
Efficient full-text keyword search remains a challenging problem in P2P systems. Most of the traditional keyword search systems on DHT overlay networks perform the join operation ...
Zheng Zhang, Shuigeng Zhou, Weining Qian, Aoying Z...
GIS
2008
ACM
14 years 8 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
PET
2012
Springer
11 years 9 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...