نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

2006
Jiuyong Li Hua Wang Huidong Jin Jianming Yong

Disclosure-control is a traditional statistical methodology for protecting privacy when data is released for analysis. Disclosure-control methods have enjoyed a revival in the data mining community, especially after the introduction of the k-anonymity model by Samarati and Sweeney. Algorithmic advances on k-anonymisation provide simple and effective approaches to protect private information of ...

1995
Surinder Singh Kahai Bruce J. Avolio John J. Sosik

A laboratory experiment was conducted to study the effects of two tipes of anoti>,mity in an electronic meeting system (EMS) setting (source anonymity: participants know who their group members are but do not know the source of any comment, and participant anonymity participants do not know who their group members are), initial difference in opinions, and their interaction on participation and ...

Journal: :ACM SIGecom Exchanges 2003

Journal: :Journal of the American Medical Informatics Association 2008

2001
Dogan Kesdogan Charles Palmer D. Kesdogan C. Palmer

The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to anyone of just about any experience level. Thus, in many respects, the virtual world has become a viable alternative to our real world, where we can buy anything from a dishwasher to personal services, or publish any information we choose on a personal web site. With all of the convenience and fr...

2015
Priyanka Sen Vaishali Sahare

Mobile Ad-hoc Network (MANET) is type of unguided network whose nodes are self-configuring and connected by wireless links. Anonymity communication is one of the major issues in MANET. Many anonymity enhancing techniques have been introduced based on packet encryption. These were designed for the protection of communication anonymity in mobile ad hoc networks. However, passive statistical traff...

2007
Traian Marius Truta Alina Campan Paul Meyer

Existing privacy regulations together with large amounts of available data have created a huge interest in data privacy research. A main research direction is built around the k-anonymity property. Several shortcomings of the k-anonymity model have been fixed by new privacy models such as p-sensitive k-anonymity, l-diversity, (α, k)-anonymity, and t-closeness. In this paper we introduce the Enh...

2007
Micah Sherr Boon Thau Loo Matt Blaze

This paper investigates the problem of designing anonymity networks that meet application-specific performance and security constraints. We argue that existing anonymity networks take a narrow view of performance by considering only the strength of the offered anonymity. However, real-world applications impose a myriad of communication requirements, including end-to-end bandwidth and latency, t...

Journal: :Computer Networks 2008
Neelesh Bansod Ashish Malgi Byung Kyu Choi Jean Mayo

A mutual anonymity system enables communication between a client and a service provider without revealing their identities. In general, the anonymity guarantees made by the protocol are enhanced when a large number of participants are recruited into the anonymity system. Peer-to-peer (P2P) systems are able to attract a large number of nodes and hence are highly suitable for anonymity systems. H...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید