Results 21 to 30 of about 652,105 (293)
Anonymity in Bitcoin and Bitmessage [PDF]
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core +1 more source
On the Anonymization of Differentially Private Location Obfuscation
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core +1 more source
Edge-weighted anonymity for directed network graph
In social networks, weighted graph anonymity is gaining more and more attention. But fan-following graphs like Twitter’s are not protected by anonymity.
Yanze Huang +4 more
doaj +1 more source
Anonymity in Law, Criminalistics and Forensic Examination
The problem of establishing the identity of the anonymous author has always been a pressing task of criminalistics, forensic examination, literary and art studies.
A. Ya. Asnis, Sh. N. Khaziev
doaj +1 more source
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core +1 more source
Anonymity in the Action of Cyber Bullying
The emergence of cyber bullying is caused by the advancement of information technology that has led to various social networking sites that have an impact on increasing usage internet which leads to violations of social norms. This study aims to identify
Ni Putu Sri Widiasih
doaj +1 more source
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj +1 more source
This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions.
openaire +4 more sources
MultiRelational k-Anonymity [PDF]
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire +4 more sources
Improvement of the anonymity formalization based on strand space model
In order to make the strand space model satisfy the special needs of anonymity analysis,based on equivalent bundles and view of observer,two kinds of sender anonymities as well as recipient anonymities were defined;relation anonymity were defined in two ...
DONG Xue-wen1 +4 more
doaj +2 more sources

