Results 21 to 30 of about 690,729 (282)
Towards Flexible Anonymous Networks [PDF]
16 pages, including bibliography and appendices. To be published in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24), October 14-18, 2024, Salt Lake City, UT, USA.
Florentin Rochet +2 more
openaire +2 more sources
Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua +2 more
core +4 more sources
Plain Language summary Women seeking an induced abortion in LMICs often face inexistent or inadequate, difficult to find and/ or stigmatizing legal services, leading to the use of informal methods and providers, and unsafe abortions.
Clémentine Rossier +3 more
doaj +1 more source
Computing Boolean Functions on Anonymous Networks [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kranakis, E. +2 more
openaire +1 more source
Advances in technology have made it possible to collect data about individuals and the connections between them, such as email correspondence and friendships. Agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the data.
Hay, Michael +4 more
openaire +4 more sources
Hiding the identity of involved participants in the network, known as anonymity, is a crucial issue in some cryptographic applications such as electronic voting systems, auctions, digital signatures, and Byzantine agreements.
Saw Nang Paing +5 more
doaj +1 more source
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj +1 more source
A Faster Counting Protocol for Anonymous Dynamic Networks [PDF]
We study the problem of counting the number of nodes in a slotted-time communication network, under the challenging assumption that nodes do not have identifiers and the network topology changes frequently.
Milani, Alessia, Mosteiro, Miguel A.
core +2 more sources
Research and Implementation of Anonymous Communication Scheme with Multicast Network Coding [PDF]
Network coding is an efficient way of implementing anonymous communication,but it cannot improve the throughput in multiple unicast networks.Aiming at this problem,this paper proposes an anonymous communication scheme under multicast network,combined ...
LI Li,WU Zhenqiang
doaj +1 more source
Privacy Protection Method in Continuous Publishing of Graph Data [PDF]
With the development of Internet technology and popularity of intelligent terminals, a large amount of user privacy data have been generated in social networks.The public release of social network data increases the risk of user privacy disclosure ...
ZHU Liming, DING Xiaobo, GONG Guoqiang
doaj +1 more source

