Sciweavers

108 search results - page 9 / 22
» Direct anonymous attestation
Sort
View
CCS
2009
ACM
14 years 3 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
PDCAT
2005
Springer
14 years 2 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
ICRA
2009
IEEE
155views Robotics» more  ICRA 2009»
14 years 3 months ago
Monte Carlo simultaneous localization of multiple unknown transient radio sources using a mobile robot with a directional antenn
— We report our system and algorithm developments that enable a single mobile robot equipped with a directional antenna to simultaneously localize multiple unknown transient radi...
Dezhen Song, Chang-Young Kim, Jingang Yi
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
14 years 2 months ago
Aggregate Query Answering on Anonymized Tables
Privacy is a serious concern when microdata need to be released for ad hoc analyses. The privacy goals of existing privacy protection approaches (e.g., -anonymity and -diversity) ...
Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Y...
WPES
2003
ACM
14 years 1 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...