Results 1 to 10 of about 652,105 (293)
“This World Actually Has Come to Pass”: Franz Kafka’s Artistic Universe in the Theoretical Studies of Hannah Arendt [PDF]
The article is devoted to the consideration of Franz Kafka’s creativity in the interpretation of the German-American philosopher and political theorist Hannah Arendt.
Kirill V. Lostchevsky
doaj +1 more source
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based ...
Jun Cui +3 more
doaj +1 more source
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes.
Niluka Amarasinghe +2 more
doaj +1 more source
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj +1 more source
A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. [PDF]
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating ...
Liaojun Pang +4 more
doaj +1 more source
Measuring Perceived Anonymity: The Development of a Context Independent Instrument
In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.
Dwight M. Hite +2 more
doaj +1 more source
AbstractThis paper addresses how the anonymity of an assertion affects the epistemological dimension of its production by speakers, and its reception by hearers. After arguing that anonymity does have implications in both respects, I go on to argue that at least some of these implications derive from a warranted diminishment in speakers' and hearers ...
openaire +2 more sources
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. However, the leakage rate in the
Leyou Zhang +3 more
doaj +1 more source
Octopus: A Secure and Anonymous DHT Lookup [PDF]
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core +1 more source
An anonymous interaction might facilitate provoking behavior and modify the engagement of theory of mind (TOM) brain mechanisms. However, the effect of anonymity when processing unfair behavior of an opponent remains largely unknown.
Maya Zheltyakova +11 more
doaj +1 more source

