Sciweavers

1351 search results - page 163 / 271
» Trust in Anonymity Networks
Sort
View
INFOSCALE
2009
ACM
14 years 4 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
WETICE
2009
IEEE
14 years 5 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
NCA
2005
IEEE
14 years 3 months ago
Location-based Publish/Subscribe
This paper introduces the concept of location-based publish/subscribe (LPS), which allows mobile ad hoc applications to anonymously communicate with each other, depending on their...
Patrick Th. Eugster, Benoît Garbinato, Adria...
AINA
2005
IEEE
14 years 5 days ago
Estimations on the Security Aspect of Brand's Electronic Cash Scheme
In Crypto’93, Stefan Brands [1] proposed a very efficient off-line electronic cash. Then, the subsequent researchers such as Ernest Foo [2,3], WK Yip [4] and Yiannis [5] develop...
Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman
CMS
2006
110views Communications» more  CMS 2006»
13 years 11 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...