Sciweavers

108 search results - page 6 / 22
» Direct anonymous attestation
Sort
View
COLING
1994
13 years 11 months ago
Towards a Proper Linguistic and Computational Treatment of Scrambling: An Analysis of Japanese
t This paper describes how recent linguistic results in explaining Japanese short and long distance scram hling (:an be directly incorporated into an existing principles-and-parame...
Sandiway Pong
FOCS
2006
IEEE
14 years 3 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
SPW
2004
Springer
14 years 3 months ago
Limits to Anonymity When Using Credentials
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
Andreas Pashalidis, Chris J. Mitchell