Sciweavers

230 search results - page 26 / 46
» On Anonymity with Identity Escrow
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
DIAU
2000
Springer
14 years 8 days ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
INFOCOM
1995
IEEE
13 years 11 months ago
The Use of Communications Networks to Increase Personal Privacy
CommunicationsNetworks can separate as well asjoin iMormation. This ability can be used to increase personal privacy in an environment where advances in technology makes it possib...
Nicholas F. Maxemchuk, Steven H. Low
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 8 months ago
Distributed anonymous discrete function computation
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage c...
Julien M. Hendrickx, Alexander Olshevsky, John N. ...
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
14 years 2 months ago
Mutual localization in a multi-robot system with anonymous relative position measures
— We address the mutual localization problem for a multi-robot system, under the assumption that each robot is equipped with a sensor that provides a measure of the relative posi...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno