Swinburne
Browse

Applying a cryptographic scheme in the RPINA protocol

Download (270.59 kB)
conference contribution
posted on 2024-07-13, 03:26 authored by Giannakis Antoniou, Ana Jancic, Udaya Parampalli, Leon SterlingLeon Sterling
The Respect Private Information of Non Abusers (RPINA) protocol allows users to communicate anonymously while the corresponding server ensures that the identity of the user will be revealed by a third party, called Directory Service (DS), should the user attempt a malicious attack. However, malicious co-operation between the server and the DS is the major vulnerability of the RPINA protocol. In this paper we introduce a technique, which decrease this vulnerability.

History

Available versions

PDF (Published version)

ISBN

9780769529417

Journal title

2nd International Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Karlovassi, Greece, 27-28 August 2007

Conference name

2nd International Annual Workshop on Digital Forensics and Incident Analysis WDFIA 2007, Karlovassi, Greece, 27-28 August 2007

Pagination

9 pp

Publisher

IEEE

Copyright statement

Copyright © 2007 IEEE. The published version is reproduced in accordance with the copyright policy of the publisher. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Language

eng

Usage metrics

    Publications

    Categories

    No categories selected

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC