Sciweavers

1599 search results - page 24 / 320
» Probabilistic Analysis of Anonymity
Sort
View
130
Voted
ACISP
2009
Springer
15 years 10 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
128
Voted
ECBS
2009
IEEE
113views Hardware» more  ECBS 2009»
15 years 10 months ago
Modeling and Analysis of Probabilistic Timed Systems
Probabilistic models are useful for analyzing systems which operate under the presence of uncertainty. In this paper, we present a technique for verifying safety and liveness prop...
Abhishek Dubey, Derek Riley, Sherif Abdelwahed, Te...
106
Voted
FC
2004
Springer
80views Cryptology» more  FC 2004»
15 years 9 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
150
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
144
Voted
QEST
2006
IEEE
15 years 9 months ago
LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive Systems
LiQuor is a tool for verifying probabilistic reactive systems modelled Probmela programs, which are terms of a probabilistic guarded command language with an operational semantics...
Frank Ciesinski, Christel Baier