Sciweavers

1064 search results - page 93 / 213
» Cryptography from Anonymity
Sort
View
ICC
2007
IEEE
15 years 10 months ago
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol
— The buyer-seller watermarking protocol enables a seller to successfully identify at least one traitor from a pirated copy, while prevent the seller from framing an innocent buy...
Yongdong Wu
SOFSEM
2004
Springer
15 years 9 months ago
Discovery of Lexical Entries for Non-taxonomic Relations in Ontology Learning
Ontology learning from texts has recently been proposed as a new technology helping ontology designers in the modelling process. Discovery of non–taxonomic relations is understoo...
Martin Kavalec, Alexander Maedche, Vojtech Sv&aacu...
CSE
2009
IEEE
15 years 8 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme

Publication
311views
17 years 3 months ago
Towards Privacy-Aware Location-Based Database Servers
The wide spread of location-based services results in a strong market for location-detection devices (e.g., GPS-like devices, RFIDs, handheld devices, and cellular phones). Example...
Mohamed F. Mokbel
ESORICS
2007
Springer
15 years 7 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright