Results 21 to 30 of about 496,765 (185)
Reputation Systems for Anonymous Networks [PDF]
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior.
Androulaki, Elli +3 more
core +3 more sources
Achieving Anonymous and Covert Reporting on Public Blockchain Networks
Reporting helps to combat illegal activities and deters lawbreakers and potential lawbreakers. From ancient times to the present, public authorities have usually rewarded effective reporting information to build harmonious societies.
Liehuang Zhu +5 more
doaj +1 more source
Computing Boolean Functions on Anonymous Networks [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kranakis, E. +2 more
openaire +1 more source
A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo +5 more
core +3 more sources
Advances in technology have made it possible to collect data about individuals and the connections between them, such as email correspondence and friendships. Agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the data.
Hay, Michael +4 more
openaire +4 more sources
Secure and Anonymous Communications Over Delay Tolerant Networks
Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental ...
Spiridon Bakiras +3 more
doaj +1 more source
Anonymous credit cards and their collusion analysis [PDF]
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H. +2 more
core +3 more sources
SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks [PDF]
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied ...
Douligeris, C. +2 more
core +1 more source
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness.
Youngseok Chung +4 more
doaj +1 more source
The Gossple Anonymous Social Network [PDF]
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to build a network of anonymous social acquaintances using a gossip protocol we call Gossple, and how to leverage such a network to enhance navigation within Web 2.0 collaborative ...
Bertier, Marin +4 more
openaire +2 more sources

