Sciweavers

1064 search results - page 145 / 213
» Cryptography from Anonymity
Sort
View
150
Voted
SOFTVIS
2006
ACM
15 years 9 months ago
The Clack graphical router: visualizing network software
We present Clack, a graphical environment for teaching students how Internet routers work and other core networking concepts. Clack is a router written as a Java Applet, and route...
Dan Wendlandt, Martin Casado, Paul Tarjan, Nick Mc...
141
Voted
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 9 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
109
Voted
MINENET
2005
ACM
15 years 9 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...
104
Voted
CCS
2004
ACM
15 years 9 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
135
Voted
ICICS
2003
Springer
15 years 9 months ago
Security Remarks on a Group Signature Scheme with Member Deletion
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...