Sciweavers

677 search results - page 1 / 136
» Secure Pseudonymous Channels
Sort
View
ESORICS
2009
Springer
14 years 11 months ago
Secure Pseudonymous Channels
Luca Viganò, Sebastian Mödersheim
P2P
2005
IEEE
106views Communications» more  P2P 2005»
14 years 4 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
DIAU
2000
Springer
14 years 3 months ago
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, u...
Andreas Pfitzmann, Marit Köhntopp
MMMACNS
2005
Springer
14 years 4 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
ESAS
2004
Springer
14 years 4 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk