Results 11 to 20 of about 695,630 (383)

Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes

open access: yesIEEE Access, 2022
The publication of a patient’s dataset is essential for various medical investigations and decision-making. Currently, significant focus has been established to protect privacy during data publishing.
J. J   +4 more
semanticscholar   +1 more source

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

open access: yesCryptogr., 2022
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera   +5 more
semanticscholar   +1 more source

A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. [PDF]

open access: yesPLoS ONE, 2016
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating ...
Liaojun Pang   +4 more
doaj   +1 more source

Measuring Perceived Anonymity: The Development of a Context Independent Instrument

open access: yesJournal of Methods and Measurement in the Social Sciences, 2014
In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.
Dwight M. Hite   +2 more
doaj   +1 more source

Anonymous Assertion [PDF]

open access: yesEpisteme, 2013
AbstractThis paper addresses how the anonymity of an assertion affects the epistemological dimension of its production by speakers, and its reception by hearers. After arguing that anonymity does have implications in both respects, I go on to argue that at least some of these implications derive from a warranted diminishment in speakers' and hearers ...
openaire   +2 more sources

Octopus: A Secure and Anonymous DHT Lookup [PDF]

open access: yes, 2012
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core   +1 more source

HUBUNGAN ANTARA ANONIMITAS DENGAN CYBERBULLYING PADA REMAJA PENGGUNA MEDIA SOSIAL [PDF]

open access: yes, 2023
Technological developments, including in this digital world, provide positive opportunities for humans to interact through social media. Teenagers are a community group that actively interacts through social media.
Deppman, Vicko Rachmadani Yandi Hendartama
core  

Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing

open access: yesIEEE Access, 2020
A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. However, the leakage rate in the
Leyou Zhang   +3 more
doaj   +1 more source

Social Interaction With an Anonymous Opponent Requires Increased Involvement of the Theory of Mind Neural System: An fMRI Study

open access: yesFrontiers in Behavioral Neuroscience, 2022
An anonymous interaction might facilitate provoking behavior and modify the engagement of theory of mind (TOM) brain mechanisms. However, the effect of anonymity when processing unfair behavior of an opponent remains largely unknown.
Maya Zheltyakova   +11 more
doaj   +1 more source

On the Anonymity of Identity-Based Encryption

open access: yesJournal of Applied Mathematics, 2013
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems.
Song Luo, Ning Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy