9,090 results
Search Results
102. ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
103. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks
104. Anonymous Authentication for RFID Systems
105. A Flexible Framework for Secret Handshakes : Multi-party Anonymous and Un-observable Authentication
106. Detecting Denial of Service Attacks in Tor
107. Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods
108. Publicly Verifiable Privacy-Preserving Group Decryption
109. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
110. On the Security Models of (Threshold) Ring Signature Schemes
111. Custodian-Hiding Verifiable Encryption
112. Anonymity for Key-Trees with Adaptive Adversaries
113. v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks
114. Dynamic ID-Based Password Authentication Protocol with Strong Security against Smart Card Lost Attacks
115. Hiding the Policy in Cryptographic Access Control
116. Vote-Independence: A Powerful Privacy Notion for Voting Protocols
117. Secure Online English Auctions
118. An HMM Approach to Anonymity Analysis of Continuous Mixes
119. Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash
120. Privacy Enhancements for Hardware-Based Security Modules
121. Flexible and Time-Based Anonymous Access Restrictions
122. Secret Signatures: How to Achieve Business Privacy Efficiently?
123. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
124. K-Anonymous Multi-party Secret Handshakes
125. An Efficient Blind Ring Signature Scheme without Pairings
126. Privacy and Liveliness for Reputation Systems
127. Efficient Dynamic k-Times Anonymous Authentication
128. Oblivious Conjunctive Keyword Search
129. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
130. Identity Based Threshold Ring Signature
131. Practical Anonymity for the Masses with MorphMix
132. A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery
133. Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks
134. A Model of Onion Routing with Provable Anonymity
135. A Passive Attack on the Privacy of Web Users Using Standard Log Information
136. Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems
137. Opacity Generalised to Transition Systems
138. Reputable Mix Networks
139. Provable Anonymity for Networks of Mixes
140. Mixminion: Strong Anonymity for Financial Cryptography
141. Provable Unlinkability against Traffic Analysis
142. On the Economics of Anonymity
143. Mix-Networks with Restricted Routes
144. Reliable MIX Cascade Networks through Reputation
145. Edinburgh Lamarckians? The Authorship of Three Anonymous Papers (1826–1829).
146. Edinburgh Lamarckians? The Authorship of Three Anonymous Papers (1826-1829)
147. A Blockchain-based File-sharing System for Academic Paper Review
148. Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)
149. Why Not Open the Black Box of Journal Editing in Philosophy? Make Peer Reviews of Published Papers Available
150. A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper)
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.