Sciweavers

1351 search results - page 48 / 271
» Trust in Anonymity Networks
Sort
View
PET
2007
Springer
14 years 2 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...
AINA
2006
IEEE
14 years 16 days ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
SEMWEB
2004
Springer
14 years 2 months ago
The Impact of Context on the Trustworthiness of Communication: An Ontological Approach
We outline a Semantic Web approach for considering the impact of context information on the trustworthiness of communication. We show that the contexts of message sender, receiver,...
Santtu Toivonen, Grit Denker
ICDCSW
2003
IEEE
14 years 2 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
CCS
2007
ACM
14 years 24 days ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...