Sciweavers

1351 search results - page 142 / 271
» Trust in Anonymity Networks
Sort
View
PST
2008
13 years 11 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
CCS
2008
ACM
14 years 4 days ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
JUCS
2010
143views more  JUCS 2010»
13 years 8 months ago
Information Support Services for Intermediation Tasks of Collaborative Networks
: Companies in collaborative networks require intermediation to perform. The collaborative network forms the breeding environment for the configuration of a Virtual Enterprise that...
Heiko Thimm, Karsten Boye Rasmussen
ICDCS
2007
IEEE
14 years 4 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
EUROCRYPT
1995
Springer
14 years 1 months ago
Fair Blind Signatures
Abstract. A blind signature scheme is a protocol for obtaining a signature from a signer such that the signer's view of the protocol cannot be linked to the resulting message-...
Markus Stadler, Jean-Marc Piveteau, Jan Camenisch