نتایج جستجو برای: anonymity
تعداد نتایج: 5605 فیلتر نتایج به سال:
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, ...
Groupthink behavior is always a risk in online groups and group decision support systems (GDSS), especially when not all potential alternatives for problem resolution are considered. It becomes a reality when individuals simply conform to the majority opinion and hesitate to suggest their own solutions to a problem. Anonymity has long been established to have an effect on conformity but no prev...
Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions. This paper proposes and analyzes a new approach for anonymous communication of agents based on the use of handles as pseudonyms. A novel naming scheme is presented that can be used by agent platforms to provide automatic anonymity of communication for all agents on its platform, or, alternative...
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To ...
The rapid development of the Internet leads to an increase in the variety and function of web applications. As a result, the relations between network anonymity and users’ tendency to self-disclose become more complicated. On the basis of Sina Weibo, this paper explores the relations between network anonymity, risk perception and self-disclosure tendency. The present paper suggests two kinds of...
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal context. Data anonymity expresses whether some piece of observed data, such as a vote, can be attributed to a user, in this case a voter. We validate the formal treatment of data anonymity by analyzing a well-known electronic voting protocol.
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile environments. When a mobile user and his visited network mutually authenticate each other, the anonymity of the user should be preserved. In order to provide user anonymity, we introduce new method of computing the temporary identity (TID) during the authentication process....
This paper studies anonymity in a setting where individuals who communicate with each other over an anonymous channel are also members of a social network. In this setting the social network graph is known to the attacker. We propose a Bayesian method to combine multiple available sources of information and obtain an overall measure of anonymity. We study the effects of network size and find th...
AIM To re-examine and expand understanding of the concept 'lack of anonymity' as a component of rural nursing theory. BACKGROUND Early healthcare literature reports lack of anonymity as part of social and working environments, particularly rural nursing. Rural nursing theory included the first published concept analysis on lack of anonymity but lacked empirical referents. Workforce, societal ...
The widespread deployment of technologies with tracking capabilities, like GPS, GSM, RFID and on-line social networks, allows mass collection of spatio-temporal data about their users. As a consequence, several methods aimed at anonymizing spatio-temporal data before their publication have been proposed in recent years. Such methods are based on a number of underlying privacy models. Among thes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید