نتایج جستجو برای: anonymity
تعداد نتایج: 5605 فیلتر نتایج به سال:
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly available information to re-identify respondent...
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymityrelated issues have been extensively studied in paymentbased systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMN...
In this paper, we first described the concept of k-anonymity and different approaches of its implementation, by formalizing the main theoretical notions. Afterwards, we have analyzed, based on a practical example, how the k-anonymity approach applies to the data-mining process in order to protect the identity and privacy of clients to whom the data refers. We have presented the most important t...
It is difficult to design a system that provides anonymity for delay-sensitive services such as Web browsing. Existing systems are either not resistant against sophisticated attacks or they achieve their level of anonymity at the cost of a high bandwidth overhead. In addition, these systems do not meet all of our requirements. In this paper, we present the architecture of our prototype implemen...
Preliminary note In existing reputation system nodes usually adopt regular pseudonyms instead of true identities to gain the anonymity. However complete anonymity will cause watershed and Sybil attack, which look on system be out of control and break the fairness of the reputation system. This paper introduces the conditional anonymity mechanism to check the evaluation between anonymity nodes, ...
(ε,m)-anonymity considers ε as the interval to define similarity between two values, and m as the level of privacy protection. For example {40,60} satisfies (ε,m)-anonymity but {40,50,60} doesn't, for ε=15 and m=2. We show that protection in {40,50,60} sensitive values of an equivalence class is not less (if don't say more) than {40,60}. Therefore, although (ε,m)anonymity has well studied publi...
Our project concerns anonymity, that is the ability of users in a system to transmit information without revealing their own identities. There are a number of protocols claiming to guarantee users’ anonymity in different situations, but there is no clear way to compare these protocols in terms of how anonymous their users really are. In order to develop a measure of anonymity, we need to be abl...
Anonymity is a factor that could lead to disinhibited behavior which is something that could cause damage to many online communities. Anonymity is a generic term and should be analyzed further into different states such as pseudonymity and complete anonymity. In this paper a survey was conducted in order to determine the differences between the two anonymity states in relation to aggression. Th...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of over...
Anonymous communication is an important part of democratic societies and freedom of speech. Whistleblowers, protest organizers, and, more broadly, anyone with controversial viewpoints have been using the limited form of anonymity the Internet provides to protect their privacy. Unfortunately, the basic anonymity the Internet guarantees is too weak to protect their identities from even the weakes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید