Enabling reputation and trust in privacy-preserving mobile sensing

X Wang, W Cheng, P Mohapatra… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Mobile sensing is becoming a popular paradigm to collect information from and outsource
tasks to mobile users. These applications deal with lot of personal information, eg, identity …

Anonymous attestation with user-controlled linkability

D Bernhard, G Fuchsbauer, E Ghadafi… - International Journal of …, 2013 - Springer
This paper is motivated by the observation that existing security models for direct
anonymous attestation (DAA) have problems to the extent that insecure protocols may be …

Anon-pass: Practical anonymous subscriptions

MZ Lee, AM Dunn, B Waters… - 2013 IEEE symposium …, 2013 - ieeexplore.ieee.org
We present the design, security proof, and implementation of an anonymous subscription
service. Users register for the service by providing some form of identity, which might or …

[PDF][PDF] rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.

Q Wang, Z Lin, N Borisov, N Hopper - NDSS, 2013 - freehaven.net
Tor is one of the most popular censorship circumvention systems; it uses bridges run by
volunteers as proxies to evade censorship. A key challenge to the Tor circumvention system …

Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting

R Henry, I Goldberg - Proceedings of the 12th ACM workshop on …, 2013 - dl.acm.org
We present BLACRONYM, a suite of new communication-and computation-efficient
protocols for anonymous blacklisting without trusted third parties. Our protocols improve on …

[PDF][PDF] Highly Controlled, Fine-grained Delegation of Signing Capabilities.

M Backes, S Meiser, D Schröder - IACR Cryptol. ePrint Arch., 2013 - Citeseer
Delegation of signing rights is a central problem in security. Whereas delegating by giving
power of attorney is well studied and digitally realized via delegatable anonymous …

[PDF][PDF] COMPUTATIONAL PUZZLES FOR REPUDIATION OF MISBEHAVING USERS IN ANONYM ZING NETWORK

T Shanmugapriya, CM Kumar, SP Kavya… - International Journal of …, 2013 - Citeseer
Anonymizing network provides web services to the users and also hide the client's IP
address from the server. All data is wrapped with several layer of encryption. The success of …

[PDF][PDF] Nymble Counter Measures for Failure Tolerant Anonymzing Networks

R Balanagu, A Jayalakshmi - academia.edu
Tor is a form of Anonymzing networks comprised of virtual tunnels that allows people and
groups to improve their privacy and security on the Internet. Individuals use Tor to keep …

[PDF][PDF] Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing

PPM Sensing - 169.237.7.61
Mobile sensing is becoming a popular paradigm to collect information from and outsource
tasks to mobile users. These applications deal with lot of personal information, eg, identity …

[PDF][PDF] Thinking Inside the BLAC Box

R Henry, I Goldberg - cacr.uwaterloo.ca
We present BLACRONYM, a suite of new communication-and computation-efficient
protocols for anonymous blacklisting without trusted third parties. Our protocols improve on …