Sciweavers

298 search results - page 27 / 60
» Strong Anonymous Signatures
Sort
View
IADIS
2004
13 years 8 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
INFOCOM
2005
IEEE
14 years 1 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
13 years 11 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
CACM
1999
138views more  CACM 1999»
13 years 7 months ago
Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
David M. Goldschlag, Michael G. Reed, Paul F. Syve...
BMCBI
2006
138views more  BMCBI 2006»
13 years 7 months ago
Determination of strongly overlapping signaling activity from microarray data
Background: As numerous diseases involve errors in signal transduction, modern therapeutics often target proteins involved in cellular signaling. Interpretation of the activity of...
Ghislain Bidaut, Karsten Suhre, Jean-Michel Claver...