Results 1 to 10 of about 695,630 (383)

LSB: A Lightweight Scalable Blockchain for IoT security and anonymity [PDF]

open access: greenJournal of Parallel and Distributed Computing, 2019
Ali Dorri, Salil S Kanhere, Raja Jurdak
exaly   +3 more sources

Social Support, Reciprocity, and Anonymity in Responses to Sexual Abuse Disclosures on Social Media

open access: yesACM Transactions on Computer-Human Interaction, 2018
Seeking and providing support is challenging. When people disclose sensitive information, audience responses can substantially impact the discloser's wellbeing.
Nazanin Andalibi   +2 more
exaly   +2 more sources

Big experimenter is watching you! Anonymity and prosocial behavior in the laboratory [PDF]

open access: green, 2011
Social preference research has received considerable attention in recent years. Researchers have demonstrated that the presence of people with other-regarding preferences can have important implications in many economic dimensions.
Franziska Barmettler   +2 more
openalex   +3 more sources

“This World Actually Has Come to Pass”: Franz Kafka’s Artistic Universe in the Theoretical Studies of Hannah Arendt [PDF]

open access: yesStudia Litterarum, 2023
The article is devoted to the consideration of Franz Kafka’s creativity in the interpretation of the German-American philosopher and political theorist Hannah Arendt.
Kirill V. Lostchevsky
doaj   +1 more source

Tor network anonymity evaluation based on node anonymity

open access: yesCybersecurity, 2023
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based ...
Jun Cui   +3 more
doaj   +1 more source

The Many Shades of Anonymity: Characterizing Anonymous Social Media Content

open access: yesInternational Conference on Web and Social Media, 2021
Recently, there has been a significant increase in the popularity of anonymous social media sites like Whisper and Secret. Unlike traditional social media sites like Facebook and Twitter, posts on anonymous social media sites are not associated with ...
D. Correa   +4 more
semanticscholar   +1 more source

The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration

open access: yesCryptography, 2021
The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes.
Niluka Amarasinghe   +2 more
doaj   +1 more source

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity [PDF]

open access: yesACM-SIAM Symposium on Discrete Algorithms, 2018
Sensitive statistics are often collected across sets of users, with repeated collection of reports done over time. For example, trends in users' private preferences or software usage may be monitored via such reports.
Ú. Erlingsson   +5 more
semanticscholar   +1 more source

The Anonymity of the Dark Web: A Survey

open access: yesIEEE Access, 2022
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned ...
Javeriah Saleem, R. Islam, M. A. Kabir
semanticscholar   +1 more source

A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2022
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj   +1 more source

Home - About - Disclaimer - Privacy