Sciweavers

230 search results - page 9 / 46
» On Anonymity with Identity Escrow
Sort
View
EDBT
2010
ACM
180views Database» more  EDBT 2010»
13 years 12 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
CSE
2009
IEEE
13 years 5 months ago
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshi...
CHI
2003
ACM
14 years 8 months ago
Identity disclosure and the creation of social capital
In this paper, we describe the identity policy decisions for a community network outside of Boston, Massachusetts. To promote trust and accountability, a member's online iden...
David R. Millen, John F. Patterson
INFOCOM
2010
IEEE
13 years 6 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant