Sciweavers

108 search results - page 5 / 22
» Direct anonymous attestation
Sort
View
PET
2012
Springer
12 years 6 days ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
14 years 4 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
IAT
2006
IEEE
14 years 3 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
ICTAI
2007
IEEE
14 years 4 months ago
Assessing Hierarchical Cooperative CoEvolution
Recently, many research efforts are directed towards coevolutionary algorithms. The present work aims at the assessment of Hierarchical Cooperative CoEvolution (HCCE) being proper...
Michail Maniadakis, Panos E. Trahanias
INFOCOM
2008
IEEE
14 years 4 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong