نتایج جستجو برای: anonymity
تعداد نتایج: 5605 فیلتر نتایج به سال:
We present a protocol for anonymous communication over the Internet. Our protocol, called P 5 (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P 5 is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P is that it allows individual participants to trade-of...
We present a protocol for anonymous communication over the Internet. Our protocol, called P5 (Peerto-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P5 is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P5 is that it allows individual participants to trade-off ...
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...
We examine experimentally how a person’s generosity depends on the degree of anonymity between giver and recipient, as well as on the parties’ sexes. Less is given when the giver is paid on stage rather than in private; men receive less than women; fewer men than women give non-zero amounts. The results suggest that it may be problematic to organize experimental data in terms of social distance...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید