Results 31 to 40 of about 695,630 (383)
The Problem of Anonymity in Archives: A Literature Review
Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and ...
Emily Ross
doaj +1 more source
On the Anonymization of Differentially Private Location Obfuscation
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core +1 more source
Strong anonymity and infinite streams. [PDF]
The extended rank-discounted utilitarian social welfare order introduced and axiomatized by Stéphane Zuber and Geir B. Asheim satisfies strong anonymity (J. Econ. Theory (2011), doi:10.1016/j.jet.2011.08.001).
Asheim +50 more
core +1 more source
Anonymity in Law, Criminalistics and Forensic Examination
The problem of establishing the identity of the anonymous author has always been a pressing task of criminalistics, forensic examination, literary and art studies.
A. Ya. Asnis, Sh. N. Khaziev
doaj +1 more source
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core +1 more source
This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions.
openaire +4 more sources
MultiRelational k-Anonymity [PDF]
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire +4 more sources
An Analysis of Anonymity in the Bitcoin System [PDF]
Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between
Fergal Reid, Martin Harrigan
semanticscholar +1 more source
Improvement of the anonymity formalization based on strand space model
In order to make the strand space model satisfy the special needs of anonymity analysis,based on equivalent bundles and view of observer,two kinds of sender anonymities as well as recipient anonymities were defined;relation anonymity were defined in two ...
DONG Xue-wen1 +4 more
doaj +2 more sources
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj +1 more source

