Sciweavers

759 search results - page 7 / 152
» What Can Be Implemented Anonymously
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 11 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
NETWORK
2006
109views more  NETWORK 2006»
13 years 9 months ago
Can DiffServ guarantee IP QoS under failures?
As ISPs and telcos converge toward all-IP network infrastructures, the problem of service reliability becomes more acute. In this article, we investigate to what extent DiffServ c...
Brunilde Sansò, Christian Awad, André...
INDOCRYPT
2001
Springer
14 years 2 months ago
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem[1]. In the previous schemes[2]-[4] the enciphering rate is so small that it seems very difficu...
Minoru Kuribayashi, Hatsukazu Tanaka
OPODIS
2003
13 years 11 months ago
Multiple Agents RendezVous in a Ring in Spite of a Black Hole
The Rendezvous of anonymous mobile agents in a anonymous network is an intensively studied problem; it calls for k anonymous, mobile agents to gather in the same site. We study thi...
Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe,...
ICNS
2007
IEEE
14 years 4 months ago
Real-time anonymization in passive network monitoring
Abstract—Passive network monitoring that observes user traffic has many advantages over active monitoring that uses test packets. It can provide characteristics of real user tra...
Sven Ubik, Petr Zejdl, Jiri Halak