Sciweavers

1064 search results - page 67 / 213
» Cryptography from Anonymity
Sort
View
AAAI
2006
13 years 11 months ago
A Compact Representation Scheme for Coalitional Games in Open Anonymous Environments
Coalition formation is an important capability of automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered is...
Naoki Ohta, Atsushi Iwasaki, Makoto Yokoo, Kohki M...
AIEDU
2007
93views more  AIEDU 2007»
13 years 9 months ago
UMPTEEN: Named and Anonymous Learner Model Access for Instructors and Peers
Recently, opening the learner model to the learner it represents has become more common in adaptive learning environments. There have also been systems that allow instructors acces...
Susan Bull, Andrew Mabbott, Abdallatif S. Abu-Issa
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 9 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 8 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 7 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...