Results 21 to 30 of about 695,630 (383)
Achieving Personalized $k$-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS
Enabled by the industrial Internet, intelligent transportation has made remarkable achievements such as autonomous vehicles by carnegie mellon university (CMU) Navlab, Google Cars, Tesla, etc.
Jinbao Wang, Zhipeng Cai, Jiguo Yu
semanticscholar +1 more source
Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs
Message authentication is crucial because it encourages participants to accept countermeasures and further transmit messages to legitimate users in a network while maintaining the legitimacy of the identity of network members. An unauthorized user cannot
Chunhong Jiao, Xinyin Xiang
doaj +1 more source
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [18]. Using recently developed invariant techniques for solving parameterised boolean equation systems,
Groote, Jan Friso, Orzan, Simona
openaire +3 more sources
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Payment channel networks have been introduced to mitigate the scalability issues inherent to permissionless decentralized cryptocurrencies such as Bitcoin.
S. Tikhomirov +2 more
semanticscholar +1 more source
AnoA: A Framework for Analyzing Anonymous Communication Protocols
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users.
Michael Backes +4 more
doaj +1 more source
Good Lamps Are the Best Police: Darkness Increases Dishonesty and Self-Interested Behavior [PDF]
Darkness can conceal identity and encourage moral transgressions; it may also induce a psychological feeling of illusory anonymity that disinhibits dishonest and self-interested behavior regardless of actual anonymity.
Bo-Zhong, Chen +2 more
core +2 more sources
k-anonymous Microdata Release via Post Randomisation Method
The problem of the release of anonymized microdata is an important topic in the fields of statistical disclosure control (SDC) and privacy preserving data publishing (PPDP), and yet it remains sufficiently unsolved.
Chida, Koji +3 more
core +1 more source
Anonymity in Bitcoin and Bitmessage [PDF]
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core +1 more source
In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time.
Chertov, Oleg, Tavrov, Dan
core +1 more source
Edge-weighted anonymity for directed network graph
In social networks, weighted graph anonymity is gaining more and more attention. But fan-following graphs like Twitter’s are not protected by anonymity.
Yanze Huang +4 more
doaj +1 more source

