Search

Showing total 9,090 results

Search Constraints

Start Over You searched for: Topic anonymity Remove constraint Topic: anonymity
9,090 results

Search Results

102. ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks

103. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

104. Anonymous Authentication for RFID Systems

105. A Flexible Framework for Secret Handshakes : Multi-party Anonymous and Un-observable Authentication

106. Detecting Denial of Service Attacks in Tor

107. Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods

108. Publicly Verifiable Privacy-Preserving Group Decryption

109. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition

110. On the Security Models of (Threshold) Ring Signature Schemes

111. Custodian-Hiding Verifiable Encryption

112. Anonymity for Key-Trees with Adaptive Adversaries

113. v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks

114. Dynamic ID-Based Password Authentication Protocol with Strong Security against Smart Card Lost Attacks

115. Hiding the Policy in Cryptographic Access Control

116. Vote-Independence: A Powerful Privacy Notion for Voting Protocols

118. An HMM Approach to Anonymity Analysis of Continuous Mixes

119. Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash

122. Secret Signatures: How to Achieve Business Privacy Efficiently?

123. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

124. K-Anonymous Multi-party Secret Handshakes

125. An Efficient Blind Ring Signature Scheme without Pairings

126. Privacy and Liveliness for Reputation Systems

127. Efficient Dynamic k-Times Anonymous Authentication

128. Oblivious Conjunctive Keyword Search

129. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

130. Identity Based Threshold Ring Signature

131. Practical Anonymity for the Masses with MorphMix

132. A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery

133. Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks

134. A Model of Onion Routing with Provable Anonymity

136. Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems

137. Opacity Generalised to Transition Systems

138. Reputable Mix Networks

139. Provable Anonymity for Networks of Mixes

140. Mixminion: Strong Anonymity for Financial Cryptography

141. Provable Unlinkability against Traffic Analysis

142. On the Economics of Anonymity

145. Edinburgh Lamarckians? The Authorship of Three Anonymous Papers (1826–1829).

146. Edinburgh Lamarckians? The Authorship of Three Anonymous Papers (1826-1829)

147. A Blockchain-based File-sharing System for Academic Paper Review

148. Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)

149. Why Not Open the Black Box of Journal Editing in Philosophy? Make Peer Reviews of Published Papers Available

150. A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper)