-
1
-
-
50249122207
-
Reputation systems for anonymous networks
-
Technical Report CUCS-029-07, Computer Science Dept, Columbia University
-
Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. Technical Report CUCS-029-07, Computer Science Dept., Columbia University (2007), http://www.cs.columbia.edu/research/ publications
-
(2007)
-
-
Androulaki, E.1
Choi, S.G.2
Bellovin, S.M.3
Malkin, T.4
-
2
-
-
64549104317
-
-
Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpç ü, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: WPES, pp. 31-40 (2007)
-
Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpç ü, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: WPES, pp. 31-40 (2007)
-
-
-
-
3
-
-
40249111589
-
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: TCC, pp. 356-374 (2008)
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: TCC, pp. 356-374 (2008)
-
-
-
-
4
-
-
84885830219
-
-
Bhattacharjee, R., Goel, A.: Avoiding ballot stuffing in ebay-like reputation systems. In: P2PECON, pp. 133-137 (2005)
-
Bhattacharjee, R., Goel, A.: Avoiding ballot stuffing in ebay-like reputation systems. In: P2PECON, pp. 133-137 (2005)
-
-
-
-
5
-
-
24944435537
-
Compact e-cash
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
6
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
84958612917
-
Effcient group signature schemes for large groups
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Effcient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
35048895319
-
Statistical disclosure or intersection attacks on anonymity systems
-
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Information Hiding, pp. 293-308 (2004)
-
(2004)
Information Hiding
, pp. 293-308
-
-
Danezis, G.1
Serjantov, A.2
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303-320 (2004)
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
12
-
-
0038717615
-
-
Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSS-DAV (2003)
-
Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSS-DAV (2003)
-
-
-
-
13
-
-
38149012971
-
Nymble: Anonymous ip-address blocking
-
Johnson, P.C., Kapadia, A., Tsang, P.P., Smith, S.W.: Nymble: Anonymous ip-address blocking. In: Privacy Enhancing Technologies, pp. 113-133 (2007)
-
(2007)
Privacy Enhancing Technologies
, pp. 113-133
-
-
Johnson, P.C.1
Kapadia, A.2
Tsang, P.P.3
Smith, S.W.4
-
14
-
-
84958591696
-
Security of blind digital signatures (extended abstract)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
15
-
-
33751039759
-
-
S&P, pp
-
Kesdogan, D., Agrawal, D., Pham, V., Rautenbach, D.: Fundamental limits on the anonymity provided by the mix technique. In: S&P, pp. 86-99 (2006)
-
(2006)
Fundamental limits on the anonymity provided by the mix technique
, pp. 86-99
-
-
Kesdogan, D.1
Agrawal, D.2
Pham, V.3
Rautenbach, D.4
-
16
-
-
84955566566
-
-
Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: EC-Web, pp. 206-215 (2003)
-
Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: EC-Web, pp. 206-215 (2003)
-
-
-
-
17
-
-
33847124145
-
-
Kinateder, M., Rothermel, K.: Architecture and algorithms for a distributed reputation system. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, pp. 1-16. Springer, Heidelberg (2003)
-
Kinateder, M., Rothermel, K.: Architecture and algorithms for a distributed reputation system. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1-16. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
24944539768
-
-
SAC, pp
-
Kinateder, M., Terdic, R., Rothermel, K.: Strong pseudonymous communication for peer-to-peer reputation systems. In: SAC, pp. 1570-1576 (2005)
-
(2005)
Strong pseudonymous communication for peer-to-peer reputation systems
, pp. 1570-1576
-
-
Kinateder, M.1
Terdic, R.2
Rothermel, K.3
-
19
-
-
67651053584
-
-
SAC, pp
-
Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym systems. In: SAC, pp. 184-199 (1999)
-
(1999)
Pseudonym systems
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
20
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
22
-
-
85088761956
-
-
Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, 2995, pp. 108-119. Springer, Heidelberg (2004)
-
Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 108-119. Springer, Heidelberg (2004)
-
-
-
-
24
-
-
0030676973
-
Anonymous connections and onion routing
-
Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, pp. 44-54 (1997)
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
26
-
-
33847309213
-
-
Voss, M., Heinemann, A., Muhlhauser, M.: A privacy preserving reputation system for mobile information dissemination networks. In: SECURECOMM, pp. 171-181 (2005)
-
Voss, M., Heinemann, A., Muhlhauser, M.: A privacy preserving reputation system for mobile information dissemination networks. In: SECURECOMM, pp. 171-181 (2005)
-
-
-
|