Sciweavers

1064 search results - page 61 / 213
» Cryptography from Anonymity
Sort
View
HICSS
2002
IEEE
114views Biometrics» more  HICSS 2002»
14 years 2 months ago
The Effects of Culture in Anonymous Negotiations: Experiment in Four Countries
Internet technologies are increasingly used in various forms of communication, including negotiations. This paper explores the cultural implications in anonymous inter- and intra-...
Gregory E. Kersten, Sabine T. Köszegi, Rudolf...
DIAU
2000
Springer
14 years 2 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
SIROCCO
1998
13 years 11 months ago
Time and Bit Optimal Broadcasting on Anonymous Unoriented Hypercubes
We consider broadcasting on asynchronous anonymous totally unoriented Nnode hypercubes. First we generalize a technique, introduced in 3 , for partial broadcasting and orientation...
Stefan Dobrev, Peter Ruzicka, Gerard Tel
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
14 years 11 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni
PET
2005
Springer
14 years 3 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...