Results 141 to 150 of about 496,765 (185)
Some of the next articles are maybe not open access.
Proceedings of the 2014 ACM symposium on Principles of distributed computing, 2014
This paper considers the computational power of anonymous message passing algorithms (henceforth, anonymous algorithms), i.e., distributed algorithms operating in a network of unidentified nodes. We prove that every problem that can be solved (and verified) by a randomized anonymous algorithm can also be solved by a deterministic anonymous algorithm ...
Yuval Emek +3 more
openaire +1 more source
This paper considers the computational power of anonymous message passing algorithms (henceforth, anonymous algorithms), i.e., distributed algorithms operating in a network of unidentified nodes. We prove that every problem that can be solved (and verified) by a randomized anonymous algorithm can also be solved by a deterministic anonymous algorithm ...
Yuval Emek +3 more
openaire +1 more source
Balancing anonymity and resilience in anonymous communication networks
Computers & Security, 2021Abstract Anonymous communication networks (ACNs) are intended to protect the metadata privacy during the communication. As typical ACNs, onion mix-nets adopt source routing where the source defines a static path and wraps the message with the public keys of on-path nodes so that the message could be delivered to the destination.
Yusheng Xia +3 more
openaire +1 more source
Anonymous transactions in computer networks
ACM Transactions on Autonomous and Adaptive Systems, 2009We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user's anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority.
Shlomi Dolev, Marina Kopeetsky
openaire +1 more source
2020
Anonymous traffic networks help anonymizing the identity and privacy of the user and their uses. There has been a great amount of interest in the research community for these implementations. Tor network, based on onion routing, has been a big volunteer-driven network and is being used worldwide.
Anand Raje, Sushanta Sinha
openaire +1 more source
Anonymous traffic networks help anonymizing the identity and privacy of the user and their uses. There has been a great amount of interest in the research community for these implementations. Tor network, based on onion routing, has been a big volunteer-driven network and is being used worldwide.
Anand Raje, Sushanta Sinha
openaire +1 more source
De-anonymizing and countermeasures in anonymous communication networks
IEEE Communications Magazine, 2015To fulfill global requirements for network security and privacy, anonymous communication systems have been extensively investigated and deployed over the world to provide anonymous communication services for users. Nonetheless, diverse de-anonymizing techniques have been proposed to compromise anonymity and impose a severe threat to anonymous ...
Ming Yang +4 more
openaire +1 more source
De-anonymizing bitcoin networks
Proceedings of the ACM Turing Celebration Conference - China, 2019The anonymity and de-anonymity of blockchain and Bitcoin have always been a hot topic in blockchain related research. Since Bitcoin was created by Nakamoto in 2009, it has, to some extent, deviated from its currency attribute as a trading medium but instead turned into an object for financial investment and operations.
Jiaming Cui +3 more
openaire +1 more source
Evaluation of Anonymity of Practical Anonymous Communication Networks
2003In the paper we shall evaluate various aspects of anonymity properties afforded by practical anonymous communication networks. For that purpose, first we propose two novel anonymity metrics for practical anonymous communication networks. Next we shall discuss whether or not deterministic protocols can provide anonymity efficiently in terms of ...
Shigeki Kitazawa +2 more
openaire +1 more source
2018
Due to technological advances, it has become easy to collect electronic records from a social network for an adversary. However, the organisations which collect data from social networks have two options before them: either they can publish the data and bear the undesirable consequence of privacy threats or not make it public by avoiding further ...
openaire +1 more source
Due to technological advances, it has become easy to collect electronic records from a social network for an adversary. However, the organisations which collect data from social networks have two options before them: either they can publish the data and bear the undesirable consequence of privacy threats or not make it public by avoiding further ...
openaire +1 more source
Social network migration and anonymity expectations: What anonymous social network apps offer
Computers in Human Behavior, 2019Abstract Social networking is not a new phenomenon, but what outlet people use continues to evolve. Recently, anonymous social networking applications (SNAs) have gained in popularity, particularly among young people who are reducing use of traditional social networking sites (SNSs).
Natalie Gerhart, Mehrdad Koohikamali
openaire +1 more source

