Sciweavers

1064 search results - page 49 / 213
» Cryptography from Anonymity
Sort
View
AIL
2004
111views more  AIL 2004»
13 years 9 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...
EUROPKI
2005
Springer
14 years 3 months ago
Interoperation Between a Conventional PKI and an ID-Based Infrastructure
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an infrastructure based on ID-based cryptography might be achieved. Major issues ari...
Geraint Price, Chris J. Mitchell
IPPS
2005
IEEE
14 years 3 months ago
Self-Stabilizing Anonymous Leader Election in a Tree
We propose a new self-stabilizing anonymous leader election algorithm in a tree graph. We show the correctness of the protocol and show that the protocol terminates in O(n4 ) time...
Zhenyu Xu, Pradip K. Srimani
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 5 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
CJ
2006
123views more  CJ 2006»
13 years 9 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...