نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

2007
Valentina Ciriani Sabrina De Capitani di Vimercati Sara Foresti Pierangela Samarati

To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly available information to re-identify respondent...

2012
B. V. S. N CHAITANYA K. KRISHNA CHAITANYA G. ANIL REDDY B. HARISH

Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymityrelated issues have been extensively studied in paymentbased systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMN...

2011
Ion LUNGU Alexandru PIRJAN

In this paper, we first described the concept of k-anonymity and different approaches of its implementation, by formalizing the main theoretical notions. Afterwards, we have analyzed, based on a practical example, how the k-anonymity approach applies to the data-mining process in order to protect the identity and privacy of clients to whom the data refers. We have presented the most important t...

2001
Marc Rennhard Bernhard Plattner Sandro Rafaeli Laurent Mathy David Hutchison

It is difficult to design a system that provides anonymity for delay-sensitive services such as Web browsing. Existing systems are either not resistant against sophisticated attacks or they achieve their level of anonymity at the cost of a high bandwidth overhead. In addition, these systems do not meet all of our requirements. In this paper, we present the architecture of our prototype implemen...

2016
Keli Zhang Yi Xian Yang

Preliminary note In existing reputation system nodes usually adopt regular pseudonyms instead of true identities to gain the anonymity. However complete anonymity will cause watershed and Sybil attack, which look on system be out of control and break the fairness of the reputation system. This paper introduces the conditional anonymity mechanism to check the evaluation between anonymity nodes, ...

2012
Mohammad-Reza Zare-Mirakabad

(ε,m)-anonymity considers ε as the interval to define similarity between two values, and m as the level of privacy protection. For example {40,60} satisfies (ε,m)-anonymity but {40,50,60} doesn't, for ε=15 and m=2. We show that protection in {40,50,60} sensitive values of an equivalence class is not less (if don't say more) than {40,60}. Therefore, although (ε,m)anonymity has well studied publi...

2006
Prakash Panangaden

Our project concerns anonymity, that is the ability of users in a system to transmit information without revealing their own identities. There are a number of protocols claiming to guarantee users’ anonymity in different situations, but there is no clear way to compare these protocols in terms of how anonymous their users really are. In order to develop a measure of anonymity, we need to be abl...

Journal: :e-Minds 2012
Michail Tsikerdekis

Anonymity is a factor that could lead to disinhibited behavior which is something that could cause damage to many online communities. Anonymity is a generic term and should be analyzed further into different states such as pseudonymity and complete anonymity. In this paper a survey was conducted in order to determine the differences between the two anonymity states in relation to aggression. Th...

2003
Dakshi Agrawal Dogan Kesdogan Stefan Penz

The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of over...

Journal: :PoPETs 2016
Albert Kwon David Lazar Srinivas Devadas Bryan Ford

Anonymous communication is an important part of democratic societies and freedom of speech. Whistleblowers, protest organizers, and, more broadly, anyone with controversial viewpoints have been using the limited form of anonymity the Internet provides to protect their privacy. Unfortunately, the basic anonymity the Internet guarantees is too weak to protect their identities from even the weakes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید