Sciweavers

1599 search results - page 137 / 320
» Probabilistic Analysis of Anonymity
Sort
View
SAINT
2008
IEEE
14 years 2 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 2 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
EDBTW
2006
Springer
14 years 1 days ago
An Integrated Platform for Analyzing Molecular-Biological Data Within Clinical Studies
To investigate molecular-biological causes and effects of diseases and their therapies it becomes increasingly important to combine data from clinical trials with high volumes of e...
Toralf Kirsten, Jörg Lange, Erhard Rahm
APSCC
2008
IEEE
13 years 10 months ago
Measuring the Effectiveness and the Fairness of Relation Hiding Systems
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
Andreas Pashalidis
ICISC
2003
108views Cryptology» more  ICISC 2003»
13 years 9 months ago
On the Security of a Group Signature Scheme with Forward Security
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable way. In case of a dispute, however, a design...
Guilin Wang