Sciweavers

1351 search results - page 46 / 271
» Trust in Anonymity Networks
Sort
View
SEC
1996
13 years 10 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
WPES
2003
ACM
14 years 2 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
IWSEC
2007
Springer
14 years 2 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
AINA
2003
IEEE
14 years 13 days ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai
CAISE
2004
Springer
14 years 2 months ago
Adding Trust to Ontology Based Peer-to-Peer Networks
This short paper starts with an overview of existing approaches of ontology based peer-to-peer solutions. It then focuses on trust issues within ontology based peer-to-peer network...
Axel Hahn, Sven Abels