Results 21 to 30 of about 496,765 (185)

Reputation Systems for Anonymous Networks [PDF]

open access: yes, 2007
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior.
Androulaki, Elli   +3 more
core   +3 more sources

Achieving Anonymous and Covert Reporting on Public Blockchain Networks

open access: yesMathematics, 2023
Reporting helps to combat illegal activities and deters lawbreakers and potential lawbreakers. From ancient times to the present, public authorities have usually rewarded effective reporting information to build harmonious societies.
Liehuang Zhu   +5 more
doaj   +1 more source

Computing Boolean Functions on Anonymous Networks [PDF]

open access: yesInformation and Computation, 1990
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kranakis, E.   +2 more
openaire   +1 more source

A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]

open access: yes, 2013
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo   +5 more
core   +3 more sources

Anonymizing Social Networks

open access: yes, 2010
Advances in technology have made it possible to collect data about individuals and the connections between them, such as email correspondence and friendships. Agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the data.
Hay, Michael   +4 more
openaire   +4 more sources

Secure and Anonymous Communications Over Delay Tolerant Networks

open access: yesIEEE Access, 2020
Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental ...
Spiridon Bakiras   +3 more
doaj   +1 more source

Anonymous credit cards and their collusion analysis [PDF]

open access: yes, 1996
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H.   +2 more
core   +3 more sources

SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks [PDF]

open access: yes, 2013
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied ...
Douligeris, C.   +2 more
core   +1 more source

An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

open access: yesSensors, 2016
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness.
Youngseok Chung   +4 more
doaj   +1 more source

The Gossple Anonymous Social Network [PDF]

open access: yes, 2010
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to build a network of anonymous social acquaintances using a gossip protocol we call Gossple, and how to leverage such a network to enhance navigation within Web 2.0 collaborative ...
Bertier, Marin   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy