: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...