نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

Journal: :Inf. Sci. 2010
Nissim Matatov Lior Rokach Oded Maimon

In privacy-preserving data mining (PPDM), a widely used method for achieving data mining goals while preserving privacy is based on k-anonymity. This method, which protects subject-specific sensitive data by anonymizing it before it is released for data mining, demands that every tuple in the released table should be indistinguishable from no fewer than k subjects. The most common approach for ...

2003
Ira S. Moskowitz Richard E. Newman

Although both anonymity and covert channels are part of the larger topic of information hiding, there also exists an intrinsic linkage between anonymity and covert channels. This linkage was illustrated in [1]; however, [1] just scratched the surface of the interplay between covert channels and anonymity, without a formal analysis of the related issues. This paper begins the process of formaliz...

2015
Manasa Annapurna R. Manasa

Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network...

2009
Edward J. Schwartz David Brumley Jonathan M. McCune

We propose, develop, and implement techniques for achieving contractual anonymity. In contractual anonymity, a user and service provider enter into an anonymity contract. The user is guaranteed anonymity and message unlinkability from the contractual anonymity system unless she breaks the contract. The service provider is guaranteed that it can identify users who break the contract. The signifi...

Journal: :IACR Cryptology ePrint Archive 2014
Yalin Chen Jue-Sam Chou

Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme with fast anonymity revoking. They claimed that their scheme could achieve security requirements of an e-cash system such as, anonymity, unlinkability, double spending checking, anonymity control, and rapid anonymity revoking on double spending. They further formally prove the unlinkability and the un-forgeability...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده مهندسی کامپیوتر 1393

امروزه گردآورندگان اطلاعات به ویژه سازمان های آماری با دو مسئله متضاد مواجه اند. از یکسو، بنا به وظیفه قانونی و رشد روزافزون تقاضا برای اطلاعات جمعآوری شده، خود را متعهد به انتشار هر چه گسترده تر و باکیفیت تر اطلاعات به شکل داده های آماری می بینند و از سوی دیگر با توجه به نگرانی عمومی نسبت به افشا اطلاعات شخصی و وظیفه قانونی این سازمانها برای مراقبت از اطلاعات خصوصی پاسخگویان، باید این تضمین را...

2011
Peng Zhou Xiapu Luo Ang Chen Rocky K. C. Chang

Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...

Journal: :JSW 2011
Qian Wang Cong Xu Min Sun

Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید