نتایج جستجو برای: anonymity
تعداد نتایج: 5605 فیلتر نتایج به سال:
Disclosure-control is a traditional statistical methodology for protecting privacy when data is released for analysis. Disclosure-control methods have enjoyed a revival in the data mining community, especially after the introduction of the k-anonymity model by Samarati and Sweeney. Algorithmic advances on k-anonymisation provide simple and effective approaches to protect private information of ...
A laboratory experiment was conducted to study the effects of two tipes of anoti>,mity in an electronic meeting system (EMS) setting (source anonymity: participants know who their group members are but do not know the source of any comment, and participant anonymity participants do not know who their group members are), initial difference in opinions, and their interaction on participation and ...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to anyone of just about any experience level. Thus, in many respects, the virtual world has become a viable alternative to our real world, where we can buy anything from a dishwasher to personal services, or publish any information we choose on a personal web site. With all of the convenience and fr...
Mobile Ad-hoc Network (MANET) is type of unguided network whose nodes are self-configuring and connected by wireless links. Anonymity communication is one of the major issues in MANET. Many anonymity enhancing techniques have been introduced based on packet encryption. These were designed for the protection of communication anonymity in mobile ad hoc networks. However, passive statistical traff...
Existing privacy regulations together with large amounts of available data have created a huge interest in data privacy research. A main research direction is built around the k-anonymity property. Several shortcomings of the k-anonymity model have been fixed by new privacy models such as p-sensitive k-anonymity, l-diversity, (α, k)-anonymity, and t-closeness. In this paper we introduce the Enh...
This paper investigates the problem of designing anonymity networks that meet application-specific performance and security constraints. We argue that existing anonymity networks take a narrow view of performance by considering only the strength of the offered anonymity. However, real-world applications impose a myriad of communication requirements, including end-to-end bandwidth and latency, t...
A mutual anonymity system enables communication between a client and a service provider without revealing their identities. In general, the anonymity guarantees made by the protocol are enhanced when a large number of participants are recruited into the anonymity system. Peer-to-peer (P2P) systems are able to attract a large number of nodes and hence are highly suitable for anonymity systems. H...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید