Results 31 to 40 of about 695,630 (383)

The Problem of Anonymity in Archives: A Literature Review

open access: yesBilgi Dünyası, 2013
Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and ...
Emily Ross
doaj   +1 more source

On the Anonymization of Differentially Private Location Obfuscation

open access: yes, 2018
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core   +1 more source

Strong anonymity and infinite streams. [PDF]

open access: yes, 2012
The extended rank-discounted utilitarian social welfare order introduced and axiomatized by Stéphane Zuber and Geir B. Asheim satisfies strong anonymity (J. Econ. Theory (2011), doi:10.1016/j.jet.2011.08.001).
Asheim   +50 more
core   +1 more source

Anonymity in Law, Criminalistics and Forensic Examination

open access: yesТеория и практика судебной экспертизы, 2023
The problem of establishing the identity of the anonymous author has always been a pressing task of criminalistics, forensic examination, literary and art studies.
A. Ya. Asnis, Sh. N. Khaziev
doaj   +1 more source

Seeking Anonymity in an Internet Panopticon

open access: yes, 2015
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core   +1 more source

Sincerely, Anonymous [PDF]

open access: yesThought: A Journal of Philosophy, 2020
This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions.
openaire   +4 more sources

MultiRelational k-Anonymity [PDF]

open access: yes2007 IEEE 23rd International Conference on Data Engineering, 2007
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire   +4 more sources

An Analysis of Anonymity in the Bitcoin System [PDF]

open access: yes2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011
Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between
Fergal Reid, Martin Harrigan
semanticscholar   +1 more source

Improvement of the anonymity formalization based on strand space model

open access: yesTongxin xuebao, 2011
In order to make the strand space model satisfy the special needs of anonymity analysis,based on equivalent bundles and view of observer,two kinds of sender anonymities as well as recipient anonymities were defined;relation anonymity were defined in two ...
DONG Xue-wen1   +4 more
doaj   +2 more sources

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things

open access: yesSensors, 2022
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj   +1 more source

Home - About - Disclaimer - Privacy