Sciweavers

1064 search results - page 17 / 213
» Cryptography from Anonymity
Sort
View
DEXAW
2002
IEEE
101views Database» more  DEXAW 2002»
14 years 28 days ago
An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers
Anonymous electronic payment systems are regarded as essential for the protection of the privacy of consumers participating in electronic transactions. In this paper, we present a...
Chunfu Tan, Jianying Zhou
PET
2010
Springer
13 years 12 months ago
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
Abstract. Low-latency anonymous communication networks require padding to resist timing analysis attacks, and dependent link padding has been proven to prevent these attacks with m...
Claudia Díaz, Steven J. Murdoch, Carmela Tr...
NSDI
2007
13 years 10 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ISW
2007
Springer
14 years 2 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo