Results 11 to 20 of about 652,105 (293)

HUBUNGAN ANTARA ANONIMITAS DENGAN CYBERBULLYING PADA REMAJA PENGGUNA MEDIA SOSIAL [PDF]

open access: yes, 2023
Technological developments, including in this digital world, provide positive opportunities for humans to interact through social media. Teenagers are a community group that actively interacts through social media.
Deppman, Vicko Rachmadani Yandi Hendartama
core  

On the Anonymity of Identity-Based Encryption

open access: yesJournal of Applied Mathematics, 2013
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems.
Song Luo, Ning Hu
doaj   +1 more source

Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs

open access: yesEntropy, 2021
Message authentication is crucial because it encourages participants to accept countermeasures and further transmit messages to legitimate users in a network while maintaining the legitimacy of the identity of network members. An unauthorized user cannot
Chunhong Jiao, Xinyin Xiang
doaj   +1 more source

Good Lamps Are the Best Police: Darkness Increases Dishonesty and Self-Interested Behavior [PDF]

open access: yes, 2010
Darkness can conceal identity and encourage moral transgressions; it may also induce a psychological feeling of illusory anonymity that disinhibits dishonest and self-interested behavior regardless of actual anonymity.
Bo-Zhong, Chen   +2 more
core   +2 more sources

AnoA: A Framework for Analyzing Anonymous Communication Protocols

open access: yesThe Journal of Privacy and Confidentiality, 2017
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users.
Michael Backes   +4 more
doaj   +1 more source

Parameterised Anonymity [PDF]

open access: yes, 2009
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [18]. Using recently developed invariant techniques for solving parameterised boolean equation systems,
Groote, Jan Friso, Orzan, Simona
openaire   +3 more sources

k-anonymous Microdata Release via Post Randomisation Method

open access: yes, 2015
The problem of the release of anonymized microdata is an important topic in the fields of statistical disclosure control (SDC) and privacy preserving data publishing (PPDP), and yet it remains sufficiently unsolved.
Chida, Koji   +3 more
core   +1 more source

Strong anonymity and infinite streams. [PDF]

open access: yes, 2012
The extended rank-discounted utilitarian social welfare order introduced and axiomatized by Stéphane Zuber and Geir B. Asheim satisfies strong anonymity (J. Econ. Theory (2011), doi:10.1016/j.jet.2011.08.001).
Asheim   +50 more
core   +1 more source

The Problem of Anonymity in Archives: A Literature Review

open access: yesBilgi Dünyası, 2013
Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and ...
Emily Ross
doaj   +1 more source

Group Anonymity

open access: yes, 2010
In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time.
Chertov, Oleg, Tavrov, Dan
core   +1 more source

Home - About - Disclaimer - Privacy