نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

Journal: :IACR Cryptology ePrint Archive 2005
Jiejun Kong

Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, ...

Journal: :JASIST 2013
Michail Tsikerdekis

Groupthink behavior is always a risk in online groups and group decision support systems (GDSS), especially when not all potential alternatives for problem resolution are considered. It becomes a reality when individuals simply conform to the majority opinion and hesitate to suggest their own solutions to a problem. Anonymity has long been established to have an effect on conformity but no prev...

Journal: :Web Intelligence and Agent Systems 2010
Martijn Warnier Frances M. T. Brazier

Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions. This paper proposes and analyzes a new approach for anonymous communication of agents based on the use of handles as pseudonyms. A novel naming scheme is presented that can be used by agent platforms to provide automatic anonymity of communication for all agents on its platform, or, alternative...

Journal: :CoRR 2017
Mehran Alidoost Nia Eduard Babulak Benjamin Fabian Reza Ebrahimi Atani

Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To ...

2017
Xi Chen Gang Li YunDi Hu Yujie Li

The rapid development of the Internet leads to an increase in the variety and function of web applications. As a result, the relations between network anonymity and users’ tendency to self-disclose become more complicated. On the basis of Sina Weibo, this paper explores the relations between network anonymity, risk perception and self-disclosure tendency. The present paper suggests two kinds of...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Sjouke Mauw Jan Verschuren Erik P. de Vink

We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal context. Data anonymity expresses whether some piece of observed data, such as a vote, can be attributed to a user, in this case a voter. We validate the formal treatment of data anonymity by analyzing a well-known electronic voting protocol.

2001
Kwangjo Kim

We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile environments. When a mobile user and his visited network mutually authenticate each other, the anonymity of the user should be preserved. In order to provide user anonymity, we introduce new method of computing the temporary identity (TID) during the authentication process....

2008
Claudia Díaz Carmela Troncoso Andrei Serjantov

This paper studies anonymity in a setting where individuals who communicate with each other over an anonymous channel are also members of a social network. In this setting the social network graph is known to the attacker. We propose a Bayesian method to combine multiple available sources of information and obtain an overall measure of anonymity. We study the effects of network size and find th...

Journal: :Journal of advanced nursing 2017
Marilyn A Swan Barbara B Hobbs

AIM To re-examine and expand understanding of the concept 'lack of anonymity' as a component of rural nursing theory. BACKGROUND Early healthcare literature reports lack of anonymity as part of social and working environments, particularly rural nursing. Rural nursing theory included the first published concept analysis on lack of anonymity but lacked empirical referents. Workforce, societal ...

Journal: :Inf. Syst. 2013
Rolando Trujillo-Rasua Josep Domingo-Ferrer

The widespread deployment of technologies with tracking capabilities, like GPS, GSM, RFID and on-line social networks, allows mass collection of spatio-temporal data about their users. As a consequence, several methods aimed at anonymizing spatio-temporal data before their publication have been proposed in recent years. Such methods are based on a number of underlying privacy models. Among thes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید