Sciweavers

1064 search results - page 78 / 213
» Cryptography from Anonymity
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ACISP
2007
Springer
14 years 3 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
SP
2006
IEEE
14 years 3 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
CHI
2010
ACM
14 years 3 months ago
Motivations to participate in online communities
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 3 months ago
Wireless Brainstorming: Overcoming Status Effects in Small Group Decisions
Social factors, such as status differences, may prevent some members from participating in group decisions. Computerized group decision support systems (GDSSs) can reduce social i...
John Davis, Melora Zaner, Shelly Farnham, Cezary M...