Sciweavers

1064 search results - page 115 / 213
» Cryptography from Anonymity
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
SIGCOMM
2000
ACM
15 years 8 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
FC
2010
Springer
191views Cryptology» more  FC 2010»
15 years 8 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg
EDBTW
2006
Springer
15 years 7 months ago
An Integrated Platform for Analyzing Molecular-Biological Data Within Clinical Studies
To investigate molecular-biological causes and effects of diseases and their therapies it becomes increasingly important to combine data from clinical trials with high volumes of e...
Toralf Kirsten, Jörg Lange, Erhard Rahm
AAAI
2008
15 years 6 months ago
Optimal False-Name-Proof Voting Rules with Costly Voting
One way for agents to reach a joint decision is to vote over the alternatives. In open, anonymous settings such as the Internet, an agent can vote more than once without being det...
Liad Wagman, Vincent Conitzer