Sciweavers

49 search results - page 5 / 10
» Pseudonym Systems
Sort
View
BIOSIG
2003
115views Biometrics» more  BIOSIG 2003»
13 years 8 months ago
Pseudonyme Biometrik: Ein signatur-basierter Ansatz
Abstract: Dieser Artikel stellt einen Ansatz zur Pseudonymisierung biometrischer Daten vor. Im Unterschied zu bisher bestehenden Ans¨atzen, setzt die Pseudonymisierung bereits bei...
Martin Johns
IH
2001
Springer
13 years 11 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
2001
Springer
13 years 11 months ago
The Strong Eternity Service
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Tonda Benes
SAC
2010
ACM
13 years 5 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...