Results 11 to 20 of about 695,630 (383)
The publication of a patient’s dataset is essential for various medical investigations and decision-making. Currently, significant focus has been established to protect privacy during data publishing.
J. J +4 more
semanticscholar +1 more source
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera +5 more
semanticscholar +1 more source
A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. [PDF]
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating ...
Liaojun Pang +4 more
doaj +1 more source
Measuring Perceived Anonymity: The Development of a Context Independent Instrument
In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.
Dwight M. Hite +2 more
doaj +1 more source
AbstractThis paper addresses how the anonymity of an assertion affects the epistemological dimension of its production by speakers, and its reception by hearers. After arguing that anonymity does have implications in both respects, I go on to argue that at least some of these implications derive from a warranted diminishment in speakers' and hearers ...
openaire +2 more sources
Octopus: A Secure and Anonymous DHT Lookup [PDF]
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core +1 more source
HUBUNGAN ANTARA ANONIMITAS DENGAN CYBERBULLYING PADA REMAJA PENGGUNA MEDIA SOSIAL [PDF]
Technological developments, including in this digital world, provide positive opportunities for humans to interact through social media. Teenagers are a community group that actively interacts through social media.
Deppman, Vicko Rachmadani Yandi Hendartama
core
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. However, the leakage rate in the
Leyou Zhang +3 more
doaj +1 more source
An anonymous interaction might facilitate provoking behavior and modify the engagement of theory of mind (TOM) brain mechanisms. However, the effect of anonymity when processing unfair behavior of an opponent remains largely unknown.
Maya Zheltyakova +11 more
doaj +1 more source
On the Anonymity of Identity-Based Encryption
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems.
Song Luo, Ning Hu
doaj +1 more source

