نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

Journal: :Renaissance Quarterly 2016

2013
Michael Backes Aniket Kate Praveen Manoharan Sebastian Meiser Esfandiar Mohammadi

Protecting individuals’ privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a fr...

Journal: :JoWUA 2014
Iulian Goriac

A common approach behind measuring anonymity is that the larger the anonymity set is the higher the degree of anonymity it supports. Our approach builds upon this intuition proposing a very general and yet precise measure for security properties. Introduced in a paper accepted for ARES 2013 conference, plausibilistic entropy promises to offer an expressive and cost effective solution for quanti...

Journal: :Nature Medicine 1997

Journal: :International Review of Economics 2007

Journal: :Nature Methods 2008

2016
Courtney Megan Cahill

The empirical study byMargaretNelson, RosannaHertz, andWendyKramer on stakeholder attitudes toward gamete donor anonymity and limits on gamete donation, ‘Gamete Donor Anonymity and Limits on Numbers of Offspring: The Views of Three Stakeholders’ (hereafter Gamete Donor Anonymity),1 is commendably particular on one level yet noticeably vague on another. It approaches the anonymity issue2 at a le...

2006
Xiaoxin Wu Jun Liu Xiaoyan Hong Elisa Bertino

Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities with similar characteristics, i.e., an anonymity set. In mobile ad hoc networks, generating and maintaining such an anonymity set for any ad hoc node are challenging because of the node mobility and consequently of the dynamic network topology. In this paper, we address the problem ...

2007
Tian Yuan

In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired. In this paper some new and general concepts in public-key encryption, i.e., “master-key anonymity”, “relevant master-key anonymity” and “key-integrity”, are introduced(the former two are defined for IBE schemes and the latter one is for any public-key encrypti...

2017
Khalid Shahbar A. Nur Zincir-Heywood

Many systems provide anonymity for their users, and most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide is affected by several factors, some of which are related to the design of the anonymity service itself. Others are related to how the system is used or the user’s application/purpose in using the an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید