Sciweavers

2421 search results - page 197 / 485
» Message from the Co-Chairs
Sort
View
CCS
2010
ACM
13 years 10 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
COMCOM
2008
95views more  COMCOM 2008»
13 years 9 months ago
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
When a vehicle moves on roads, it can receive messages from base stations (BSs) and other vehicles. After it moves far away the transmission range, the vehicle tries to find an av...
Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu
INFOCOM
2010
IEEE
13 years 8 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
TMC
2008
159views more  TMC 2008»
13 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
CORR
2009
Springer
137views Education» more  CORR 2009»
13 years 7 months ago
Choreographies with Secure Boxes and Compromised Principals
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes&quo...
Marco Carbone, Joshua D. Guttman