WebbIn this paper we introduce the notions of sender and receiver k-anonymity and consider their applications. We show that there exist simple and efficient protocols which are k … WebbA number of algorithmic techniques have been designed for privacy-preserving data mining. In this paper, we provide a review of the state-of-the-art methods for privacy. We discuss methods for randomization, k -anonymization, and …
CiteSeerX — k-anonymous message transmission
Webb27 okt. 2003 · In this paper we introduce the notions of sender and receiver k-anonymity and consider their applications. We show that there exist simple and efficient protocols … Webb30 dec. 2015 · Some Anonymous Communication Protocols for InternetMix-NETFeb 1981, D. ChaumCrowdJune 1997, Michael K. Reiter and Aviel D. RubinTarzan Nov 2002, Michael J. Freedman and Robert MorrisK-Anonymous Message TransmissionOct, 2003, Luis von Ahn, Andrew Bortz and Nicholas J. Hopper . classification marking training army
Anonymous sealed bid auction protocol based on a variant of
WebbIn this paper, a k -anonymous transmission protocol is presented. The protocol is based on asymmetric encryption algorithm. All the members in the protocol is divided into smaller groups, and if all the members in the group perform the protocol correctly, the protocol is sender k -anonymous and receiver k -anonymous. Webbvon Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proc. of the 10th ACM Conference on Computer and Communications Security, pp. 122–130. ACM Press, New York (2003) CrossRef Google Scholar Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credentials. http://www.fractalscape.org/files/byzantine-k-anonymous-onf2.pdf classification_metrics