Sciweavers

1064 search results - page 22 / 213
» Cryptography from Anonymity
Sort
View
133
Voted
ESORICS
2012
Springer
13 years 6 months ago
Exploring Linkability of User Reviews
Large numbers of people all over the world read and contribute to various review sites. Many contributors are understandably concerned about privacy in general and, specifically,...
Mishari Al Mishari, Gene Tsudik
117
Voted
COMPSAC
2009
IEEE
15 years 8 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
106
Voted
FC
2008
Springer
90views Cryptology» more  FC 2008»
15 years 5 months ago
Practical Anonymous Divisible E-Cash from Bounded Accumulators
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unl...
Man Ho Au, Willy Susilo, Yi Mu
130
Voted
NDSS
2007
IEEE
15 years 10 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
142
Voted
CDC
2010
IEEE
107views Control Systems» more  CDC 2010»
14 years 10 months ago
Probabilistic mutual localization in multi-agent systems from anonymous position measures
Abstract-- Recent research on multi-agent systems has produced a plethora of decentralized controllers that implicitly assume various degrees of agent localization. However, many p...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno