Results 61 to 70 of about 695,630 (383)

A K-Anonymity Based Schema for Location Privacy Preservation

open access: yesIEEE Transactions on Sustainable Computing, 2019
In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information.
Fan Fei   +5 more
semanticscholar   +1 more source

Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees [PDF]

open access: yesPERV, 2018
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that ...
G. Fanti   +6 more
semanticscholar   +1 more source

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

p-probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation [PDF]

open access: yes, 2016
We develop a probabilistic variant of k-anonymous microaggregation which we term p-probabilistic resorting to a statistical model of respondent participation in order to aggregate quasi-identifiers in such a manner that k-anonymity is concordantly ...
Forné Muñoz, Jorge   +3 more
core   +2 more sources

Daily activity locations k-anonymity for the evaluation of disclosure risk of individual GPS datasets

open access: yesInternational Journal of Health Geographics, 2020
Background Personal privacy is a significant concern in the era of big data. In the field of health geography, personal health data are collected with geographic location information which may increase disclosure risk and threaten personal geoprivacy ...
Jue Wang, M. Kwan
semanticscholar   +1 more source

Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin   +2 more
wiley   +1 more source

Effects of anonymity on decision making and evaluations of others' decisions in moral dilemmas

open access: yesActa Psychologica
This study aimed to examine the effects of anonymity on decision making and evaluations of others' decisions in moral dilemmas. The following three conditions were examined: the use of one's real name, pseudonymity (i.e., the use of a nickname), and ...
Hitoshi Terai, Shinji Kai, Misato Oi
doaj   +1 more source

Anonymity, Piracy and Counterfeiting in the Polish Language Publications in the Grand Duchy of Lithuania in the 2nd Half of the 16th Century

open access: yesKnygotyra, 2023
On the grounds of the bibliographic analysis of the publications in the Polish language in the Grand Duchy of Lithuania in the second half of the 16th century, this article reconstructs the phenomena of anonymity, counterfeiting and piracy.
Tomas Petreikis
doaj   +1 more source

De-Anonymizing Anonymous

open access: yes, 2016
Review of: Gabriella Coleman, Hacker, Hoaxer, Whistleblower, Spy.
openaire   +2 more sources

Home - About - Disclaimer - Privacy