Results 11 to 20 of about 2,306,542 (276)

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

Personelles

open access: yesArachnologische Mitteilungen, 1991
Luis Acosta, Manfred ...
Anonymous, Anonymous
doaj   +1 more source

Editorial

open access: yesArachnologische Mitteilungen, 2000
editorial
Anonymous, Anonymous
doaj   +1 more source

Anonymous quantum communication

open access: yes, 2007
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants.
A. Broadbent   +10 more
core   +1 more source

Sincerely, Anonymous [PDF]

open access: yesThought: A Journal of Philosophy, 2020
This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions.
openaire   +4 more sources

MultiRelational k-Anonymity [PDF]

open access: yes2007 IEEE 23rd International Conference on Data Engineering, 2007
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire   +4 more sources

Patient privacy protection using anonymous access control techniques [PDF]

open access: yes, 2008
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases.
Elmufti, K.   +3 more
core   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

On Iterated Dominance, Matrix Elimination, and Matched Paths [PDF]

open access: yes, 2010
We study computational problems arising from the iterated removal of weakly dominated actions in anonymous games. Our main result shows that it is NP-complete to decide whether an anonymous game with three actions can be solved via iterated weak ...
Brandt, Felix   +2 more
core   +5 more sources

Parent‐to‐Child Information Disclosure in Pediatric Oncology

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy