A secure ad-hoc survey scheme enables a survey authority to independently (without any interaction) select an ad-hoc group of registered users based only on their identities (e.g., their email addresses), and create a survey where only selected users can anonymously submit exactly one response. We present a formalization of secure ad-hoc surveys and present: * an abstract provably-secure implementation based on standard cryptographic building blocks (which in particular are implied by the existence of enhanced trapdoor permutations in the CRS model); * a practical instantiation of our abstract protocol, called ANONIZE, which is provably-secure in the random oracle model based on cryptographic assumptions on groups with bilinear maps. A...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
In this paper, we study a problem of protecting privacy of individuals in large public survey rating...
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to trade-offs a...
Abstract-A secure ad-hoc survey scheme enables a survey authority to independently (without any inte...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
In this paper, we study a problem of privacy protection in large survey rating data. The rating dat...
Anonymous certification (AC) refers to cryptographic mechanisms in which users get certified from tr...
There is a vast body of work on {\em implementing} anonymous communication. In this paper, we study ...
Anonymity is a security property of paramount importance, as we move steadily towards a wired, onlin...
Privacy-providing tools, including tools that provide anonymity, are gaining popularity in the moder...
The popularity of internet as a communication medium whether for personal or business requires anon...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
We present a powerful and flexible method for automatically checking anonymity in a possibilistic ge...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc n...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
In this paper, we study a problem of protecting privacy of individuals in large public survey rating...
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to trade-offs a...
Abstract-A secure ad-hoc survey scheme enables a survey authority to independently (without any inte...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
In this paper, we study a problem of privacy protection in large survey rating data. The rating dat...
Anonymous certification (AC) refers to cryptographic mechanisms in which users get certified from tr...
There is a vast body of work on {\em implementing} anonymous communication. In this paper, we study ...
Anonymity is a security property of paramount importance, as we move steadily towards a wired, onlin...
Privacy-providing tools, including tools that provide anonymity, are gaining popularity in the moder...
The popularity of internet as a communication medium whether for personal or business requires anon...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
We present a powerful and flexible method for automatically checking anonymity in a possibilistic ge...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc n...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
In this paper, we study a problem of protecting privacy of individuals in large public survey rating...
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to trade-offs a...