Sciweavers

1064 search results - page 143 / 213
» Cryptography from Anonymity
Sort
View
116
Voted
TAMC
2009
Springer
15 years 10 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
148
Voted
GROUP
2009
ACM
15 years 10 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientific peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workā...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
115
Voted
NDSS
2008
IEEE
15 years 10 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 10 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
164
Voted
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 10 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho