搜索结果: 31-34 共查到“军事学 anonymity”相关记录34条 . 查询时间(0.096 秒)
Formal Notions of Anonymity for Peer-to-peer Networks
Formal notion of anonymity Probabilistic Polynomial Route model Chosen Recipient Attack
2009/2/6
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential
privacy attacks (e.g., network address traceback) may deter a storage source from providing the n...
Cryptography from Anonymity
cryptography anonymity
2008/11/4
There is a vast body of work on implementing anonymous communication. In this paper, we study
the possibility of using anonymous communication as a building block, and show that one can leverage on a...
Some Results on Anonymity in Hybrid Encryption
Computational Cryptography Public-Key Anonymity Provable Security
2008/9/4
Anonymity(key-privacy) as well as security(data-privacy) are all important features in public-key encryption applications. In this paper two new and general concepts, named “relevant anonymity” and “r...
Some General Consequences on Chosen-ciphertext Anonymity in Public-Key Encryption
Computational Cryptography Provable Security Anonymity Master-key Anonymity
2008/8/27
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired. In this paper some new and general concepts in public-key encry...