Results 11 to 20 of about 496,765 (185)

De-anonymizing Social Networks [PDF]

open access: yes2009 30th IEEE Symposium on Security and Privacy, 2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
Narayanan, Arvind, Shmatikov, Vitaly
openaire   +4 more sources

Anonymous and secret communication in quantum networks

open access: yesNew Journal of Physics, 2021
Secure communication is one of the key applications of quantum networks. In recent years, following the demands for identity protection in classical communication protocols, the need for anonymity has also emerged for quantum networks.
Christopher Thalacker   +4 more
doaj   +1 more source

EPAW: Efficient Privacy Preserving Anonymous Mutual Authentication Scheme for Wireless Body Area Networks (WBANs)

open access: yesIEEE Access, 2020
The recent advancement in wireless body area networks (WBAN) plays an important role in remote health care systems. However, these networks are suffering from data security and privacy threats.
Subramani Jegadeesan   +4 more
doaj   +1 more source

Associations of Internet Developers

open access: yesVestnik MGIMO-Universiteta, 2013
The results of research of participation of international networked associations of internet developers in world political process are presented in the article.
S. S. Shirin
doaj   +1 more source

Efficient Anonymous Authentication for Wireless Body Area Networks

open access: yesIEEE Access, 2022
Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients
Chuang Li, Chunxiang Xu
doaj   +1 more source

Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]

open access: yes, 2007
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua   +2 more
core   +4 more sources

Elections in Anonymous Networks

open access: yesInformation and Computation, 1994
AbstractWe address the problem of electing a leader in an anonymous, asynchronous network of arbitrary topology. Our algorithms are considerably simpler than known algorithms and have equal or improved communication complexity.
Afek, Y., Matias, Y.
openaire   +2 more sources

A Faster Counting Protocol for Anonymous Dynamic Networks [PDF]

open access: yes, 2015
We study the problem of counting the number of nodes in a slotted-time communication network, under the challenging assumption that nodes do not have identifiers and the network topology changes frequently.
Milani, Alessia, Mosteiro, Miguel A.
core   +2 more sources

Tor network anonymity evaluation based on node anonymity

open access: yesCybersecurity, 2023
AbstractIn order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network behavior, and ...
Jun Cui   +3 more
openaire   +2 more sources

Towards Flexible Anonymous Networks [PDF]

open access: yesProceedings of the 23rd Workshop on Privacy in the Electronic Society, 2023
16 pages, including bibliography and appendices. To be published in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24), October 14-18, 2024, Salt Lake City, UT, USA.
Florentin Rochet   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy