Results 11 to 20 of about 652,105 (293)
HUBUNGAN ANTARA ANONIMITAS DENGAN CYBERBULLYING PADA REMAJA PENGGUNA MEDIA SOSIAL [PDF]
Technological developments, including in this digital world, provide positive opportunities for humans to interact through social media. Teenagers are a community group that actively interacts through social media.
Deppman, Vicko Rachmadani Yandi Hendartama
core
On the Anonymity of Identity-Based Encryption
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems.
Song Luo, Ning Hu
doaj +1 more source
Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs
Message authentication is crucial because it encourages participants to accept countermeasures and further transmit messages to legitimate users in a network while maintaining the legitimacy of the identity of network members. An unauthorized user cannot
Chunhong Jiao, Xinyin Xiang
doaj +1 more source
Good Lamps Are the Best Police: Darkness Increases Dishonesty and Self-Interested Behavior [PDF]
Darkness can conceal identity and encourage moral transgressions; it may also induce a psychological feeling of illusory anonymity that disinhibits dishonest and self-interested behavior regardless of actual anonymity.
Bo-Zhong, Chen +2 more
core +2 more sources
AnoA: A Framework for Analyzing Anonymous Communication Protocols
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users.
Michael Backes +4 more
doaj +1 more source
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [18]. Using recently developed invariant techniques for solving parameterised boolean equation systems,
Groote, Jan Friso, Orzan, Simona
openaire +3 more sources
k-anonymous Microdata Release via Post Randomisation Method
The problem of the release of anonymized microdata is an important topic in the fields of statistical disclosure control (SDC) and privacy preserving data publishing (PPDP), and yet it remains sufficiently unsolved.
Chida, Koji +3 more
core +1 more source
Strong anonymity and infinite streams. [PDF]
The extended rank-discounted utilitarian social welfare order introduced and axiomatized by Stéphane Zuber and Geir B. Asheim satisfies strong anonymity (J. Econ. Theory (2011), doi:10.1016/j.jet.2011.08.001).
Asheim +50 more
core +1 more source
The Problem of Anonymity in Archives: A Literature Review
Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and ...
Emily Ross
doaj +1 more source
In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time.
Chertov, Oleg, Tavrov, Dan
core +1 more source

