Sciweavers

1064 search results - page 24 / 213
» Cryptography from Anonymity
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
CSREASAM
2006
13 years 9 months ago
An ID-based Anonymous Proxy Signature From Bilinear Pairings
Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu
DI
2010
62views more  DI 2010»
13 years 8 months ago
Mining writeprints from anonymous e-mails for forensic investigation
Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. F...
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 5 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno