Sciweavers

1064 search results - page 10 / 213
» Cryptography from Anonymity
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 8 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
PDCAT
2009
Springer
14 years 2 months ago
Bifrost : A Novel Anonymous Communication System with DHT
An immense amount of information is processed on the Internet due to its spread, increasing the severity of such problems as the disclosure of personal information; privacy protec...
Masaki Kondo, Shoichi Saito, Kiyohisa Ishiguro, Hi...
WPES
2006
ACM
14 years 1 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
ECUMN
2007
Springer
13 years 12 months ago
Improved User Identity Confidentiality for UMTS Mobile Networks
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such s...
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili