Sciweavers

1064 search results - page 7 / 213
» Cryptography from Anonymity
Sort
View
PERCOM
2010
ACM
13 years 5 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 2 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
ACNS
2005
Springer
124views Cryptology» more  ACNS 2005»
14 years 1 months ago
Building Reliable Mix Networks with Fair Exchange
In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anon...
Michael K. Reiter, XiaoFeng Wang, Matthew Wright
ACNS
2007
Springer
85views Cryptology» more  ACNS 2007»
14 years 2 months ago
Midpoints Versus Endpoints: From Protocols to Firewalls
Diana von Bidder, David A. Basin, Germano Caronni
PAIRING
2007
Springer
119views Cryptology» more  PAIRING 2007»
14 years 2 months ago
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps
Benoît Libert, Jean-Jacques Quisquater