Sciweavers

1064 search results - page 46 / 213
» Cryptography from Anonymity
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
COLING
2010
13 years 3 months ago
The Role of Queries in Ranking Labeled Instances Extracted from Text
A weakly supervised method uses anonymized search queries to induce a ranking among class labels extracted from unstructured text for various instances. The accuracy of the extrac...
Marius Pasca
ICICS
2003
Springer
14 years 1 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
ASIACRYPT
2001
Springer
13 years 11 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 8 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow