Sciweavers

1064 search results - page 80 / 213
» Cryptography from Anonymity
Sort
View
SIGIR
2003
ACM
14 years 2 months ago
Towards Virtual Knowledge Communities in Peer-to-Peer Networks
As a result of the anonymity in todays Web search, it is not possible to receive a personalized search result. Neither prior search results nor search results from other users are ...
Melanie Gnasa, Sascha Alda, Jasmin Grigull, Armin ...
CSE
2009
IEEE
14 years 2 months ago
Scaling Behaviors in the Communication Network between Cities
—We analyze the anonymous communication patterns of 2.5 million customers of a Belgian mobile phone operator. With these communications, we construct a social network of customer...
Gautier Krings, Francesco Calabrese, Carlo Ratti, ...
ASIACRYPT
2000
Springer
14 years 2 months ago
A Length-Invariant Hybrid Mix
This paper presents a secure and flexible Mix-net that has the following properties; it efficiently handles long plaintexts that exceed the modulus size of underlying public-key e...
Miyako Ohkubo, Masayuki Abe
CCS
2009
ACM
14 years 1 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
ALGOSENSORS
2006
Springer
14 years 1 months ago
Efficient Training of Sensor Networks
Abstract. Due to their small form factor and modest energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location ...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...