Results 211 to 220 of about 118,541 (255)
Some of the next articles are maybe not open access.
Diogenes, 2009
AbstractThe paper explores the non-institutional potential of the concept of community as it has been formulated in contemporary French philosophy. Special attention is given to historical experience, particularly in a globalizing world. Fantasies of the historical which attest to such experience are treated as constitutive of an anonymous community ...
openaire +1 more source
AbstractThe paper explores the non-institutional potential of the concept of community as it has been formulated in contemporary French philosophy. Special attention is given to historical experience, particularly in a globalizing world. Fantasies of the historical which attest to such experience are treated as constitutive of an anonymous community ...
openaire +1 more source
De-anonymizing and countermeasures in anonymous communication networks
IEEE Communications Magazine, 2015To fulfill global requirements for network security and privacy, anonymous communication systems have been extensively investigated and deployed over the world to provide anonymous communication services for users. Nonetheless, diverse de-anonymizing techniques have been proposed to compromise anonymity and impose a severe threat to anonymous ...
Ming Yang +4 more
openaire +1 more source
An Anonymity Revocation Technology for Anonymous Communication
2009A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity.
Giannakis Antoniou +2 more
openaire +1 more source
2012
Schemes of anonymous communication enable entities to send or receive their messages without disclosing their identities to others including managers of communication systems and receivers or senders of the messages. Among various existing schemes this chapter introduces Crowds, DC net, Mix-net, ESEBM (Enhanced Symmetric key Encryption Based Mix-Net ...
openaire +1 more source
Schemes of anonymous communication enable entities to send or receive their messages without disclosing their identities to others including managers of communication systems and receivers or senders of the messages. Among various existing schemes this chapter introduces Crowds, DC net, Mix-net, ESEBM (Enhanced Symmetric key Encryption Based Mix-Net ...
openaire +1 more source
Evaluation of Anonymity of Practical Anonymous Communication Networks
2003In the paper we shall evaluate various aspects of anonymity properties afforded by practical anonymous communication networks. For that purpose, first we propose two novel anonymity metrics for practical anonymous communication networks. Next we shall discuss whether or not deterministic protocols can provide anonymity efficiently in terms of ...
Shigeki Kitazawa +2 more
openaire +1 more source
Anonymous Symmetric-Key Communication
2020We study anonymity of probabilistic encryption (pE) and probabilistic authenticated encryption (pAE). We start by providing concise game-based security definitions capturing anonymity for both pE and pAE, and then show that the commonly used notion of indistinguishability from random ciphertexts (IND$) indeed implies the anonymity notions for both pE ...
Fabio Banfi, Ueli Maurer
openaire +1 more source
Secure Anonymous Communications with Practical Anonymity Revocation Scheme
2007We propose an anonymous communication scheme using a multistage cryptographic anonymous proxy to make malicious users traceable. For the purpose of preventing illegal use of an anonymous channel, the proposed scheme can identify an illegal anonymous user or his accomplice who joins a conspiracy if a threshold number of third parties or more agrees on ...
Koji Chida +2 more
openaire +1 more source
Trust-based anonymous communication
Proceedings of the 18th ACM conference on Computer and communications security, 2011We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on anonymous communication, and in particular onion routing, although we expect the approach to apply more broadly.This paper provides two main contributions.
Aaron M. Johnson +3 more
openaire +1 more source

