Sciweavers

1064 search results - page 143 / 213
» Cryptography from Anonymity
Sort
View
TAMC
2009
Springer
14 years 3 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
GROUP
2009
ACM
14 years 3 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientiļ¬c peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workā...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
NDSS
2008
IEEE
14 years 3 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can beneļ¬t from online matchmaking, protocols deļ¬ned over the past two decade...
Ji Sun Shin, Virgil D. Gligor
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
14 years 3 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identiļ¬cation a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
ICC
2007
IEEE
169views Communications» more  ICC 2007»
14 years 3 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
ā€”Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho