نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

2003
Jie Tang Juan-Zi Li Kehong Wang Yue-Ru Cai

Atomicity and anonymity are two important attributes for electronic commerce, especially in payment systems. Atomicity guarantees justice and coincidence for each participant. However traditional atomicity either bias to SELLER or CUSTOMER. Anonymity is also intractable, unanonymous or anonymity both leads to dissatisfying ending. Therefore, it is important to design a system in which satisfyin...

2015
F. Rochet O. Pereira O. Bonaventure

In this paper, we show how multiple-path in the transport layer could be used to increase performance and anonymity of the Tor network. The balance between anonymity and performance when creating circuit is a key to improve the situation regarding the well-known problem of end-to-end traffic correlation attack by relay adversaries. We show that the current Tor path selection algorithm heavily b...

Journal: :The Journal of the Korea Contents Association 2009

Journal: :International Journal of Communication Networks and Security 2013

Journal: :Trans. Data Privacy 2010
Alina Campan Traian Marius Truta Nicholas Cooper

Numerous privacy models based on the k‐anonymity property and extending the k‐anonymity model have been introduced in the last few years in data privacy re‐ search: l‐diversity, p‐sensitive k‐anonymity, (α, k) – anonymity, t‐closeness, etc. While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a wh...

2012
V. Sreenatha Sarma

A wireless mesh is a communication network made up of radio nodes organized in a mesh topology. A wireless mesh network help users to stay online anywhere, anytime for an unlimited time and it provide high security.In this paper we come across two issues one is anonymity and other is traceability. Anonymity provides protection for users to enjoy network services without being traced. Now a day’...

2012
Mohamed Y. Eltabakh Jalaja Padma Yasin N. Silva Pei He Walid G. Aref Elisa Bertino

Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consist...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید