Results 21 to 30 of about 652,105 (293)

Anonymity in Bitcoin and Bitmessage [PDF]

open access: yes, 2018
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core   +1 more source

On the Anonymization of Differentially Private Location Obfuscation

open access: yes, 2018
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core   +1 more source

Edge-weighted anonymity for directed network graph

open access: yesIntelligent and Converged Networks
In social networks, weighted graph anonymity is gaining more and more attention. But fan-following graphs like Twitter’s are not protected by anonymity.
Yanze Huang   +4 more
doaj   +1 more source

Anonymity in Law, Criminalistics and Forensic Examination

open access: yesТеория и практика судебной экспертизы, 2023
The problem of establishing the identity of the anonymous author has always been a pressing task of criminalistics, forensic examination, literary and art studies.
A. Ya. Asnis, Sh. N. Khaziev
doaj   +1 more source

Seeking Anonymity in an Internet Panopticon

open access: yes, 2015
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core   +1 more source

Anonymity in the Action of Cyber Bullying

open access: yesRechtsidee: Law Journal, 2019
The emergence of cyber bullying is caused by the advancement of information technology that has led to various social networking sites that have an impact on increasing usage internet which leads to violations of social norms. This study aims to identify
Ni Putu Sri Widiasih
doaj   +1 more source

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things

open access: yesSensors, 2022
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj   +1 more source

Sincerely, Anonymous [PDF]

open access: yesThought: A Journal of Philosophy, 2020
This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions.
openaire   +4 more sources

MultiRelational k-Anonymity [PDF]

open access: yes2007 IEEE 23rd International Conference on Data Engineering, 2007
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire   +4 more sources

Improvement of the anonymity formalization based on strand space model

open access: yesTongxin xuebao, 2011
In order to make the strand space model satisfy the special needs of anonymity analysis,based on equivalent bundles and view of observer,two kinds of sender anonymities as well as recipient anonymities were defined;relation anonymity were defined in two ...
DONG Xue-wen1   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy