LSB: A Lightweight Scalable Blockchain for IoT security and anonymity [PDF]
Ali Dorri, Salil S Kanhere, Raja Jurdak
exaly +3 more sources
Social Support, Reciprocity, and Anonymity in Responses to Sexual Abuse Disclosures on Social Media
Seeking and providing support is challenging. When people disclose sensitive information, audience responses can substantially impact the discloser's wellbeing.
Nazanin Andalibi +2 more
exaly +2 more sources
Big experimenter is watching you! Anonymity and prosocial behavior in the laboratory [PDF]
Social preference research has received considerable attention in recent years. Researchers have demonstrated that the presence of people with other-regarding preferences can have important implications in many economic dimensions.
Franziska Barmettler +2 more
openalex +3 more sources
“This World Actually Has Come to Pass”: Franz Kafka’s Artistic Universe in the Theoretical Studies of Hannah Arendt [PDF]
The article is devoted to the consideration of Franz Kafka’s creativity in the interpretation of the German-American philosopher and political theorist Hannah Arendt.
Kirill V. Lostchevsky
doaj +1 more source
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based ...
Jun Cui +3 more
doaj +1 more source
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
Recently, there has been a significant increase in the popularity of anonymous social media sites like Whisper and Secret. Unlike traditional social media sites like Facebook and Twitter, posts on anonymous social media sites are not associated with ...
D. Correa +4 more
semanticscholar +1 more source
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes.
Niluka Amarasinghe +2 more
doaj +1 more source
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity [PDF]
Sensitive statistics are often collected across sets of users, with repeated collection of reports done over time. For example, trends in users' private preferences or software usage may be monitored via such reports.
Ú. Erlingsson +5 more
semanticscholar +1 more source
The Anonymity of the Dark Web: A Survey
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned ...
Javeriah Saleem, R. Islam, M. A. Kabir
semanticscholar +1 more source
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj +1 more source

