Results 41 to 50 of about 496,765 (185)

K-In&Out-Degree Anonymity Method for Large Scale Social Networks [PDF]

open access: yesJisuanji gongcheng, 2020
Existing privacy protection techniques are inefficient when applied to directed graphs of large-scale social networks,and publishing anonymous data does not meet the needs of community structure analysis.To address the problem,this paper proposes a K-In ...
ZHANG Xiaolin, LIU Jiao, BI Hongjing, LI Jian, WANG Yongping
doaj   +1 more source

Controllable and Anonymous Authentication Scheme for Space Networks

open access: yesITM Web of Conferences, 2017
This paper analyzed the existing anonymous authentication schemes which have the weakness of high calculation and communication cost and weak security.
Hu Zhi-Yan, Du Xue-Hui, Cao Li-Feng
doaj   +1 more source

Anonymous data collection scheme for cloud-aided mobile edge networks

open access: yesDigital Communications and Networks, 2020
With the rapid spread of smart sensors, data collection is becoming more and more important in Mobile Edge Networks (MENs). The collected data can be used in many applications based on the analysis results of these data by cloud computing. Nowadays, data
Anxi Wang   +4 more
doaj   +1 more source

Flexible Anonymous Network

open access: yes, 2019
Internet technologies have been designed from guidelines like the robustness principle also known as Postel's law. Jon Postel's law is described as: "Be conservative in what you do, be liberal in what you accept from others." Fundamentally, it advises protocol designs to be tolerant with what they accept from the other peers.
Rochet, Florentin   +2 more
openaire   +3 more sources

Non Trivial Computations in Anonymous Dynamic Networks [PDF]

open access: yes, 2016
In this paper we consider a static set of anonymous processes, i.e., they do not have distinguished IDs, that communicate with neighbors using a local broadcast primitive.
Baldoni, Roberto, Di Luna, Giuseppe
core   +2 more sources

Perceptions and Use of Anonymous Communication across Cultures [PDF]

open access: yes, 2015
We use social networks to communicate, keep in touch and express our opinions in a manner that has become completely ubiquitous. However, this very ubiquity and ease of expression have exposed another, contentious side – one where nobody can remain ...
Lang, Guido, Mavlanova, Tamilla
core   +1 more source

Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning

open access: yesSensors
Anonymous networks, which aim primarily to protect user identities, have gained prominence as tools for enhancing network security and anonymity. Nonetheless, these networks have become a platform for adversarial affairs and sources of suspicious attack ...
Dazhou Liu, Younghee Park
doaj   +1 more source

Threading Statistical Disclosure Attack with EM: An Algorithm for Revealing Identity in Anonymous Communication Networks

open access: yesApplied Sciences
Messages sent across multiple platforms can be correlated to infer users’ attitudes, behaviors, preferences, lifestyles, and more. Therefore, research on anonymous communication systems has intensified in the last few years.
Alejandra Guadalupe Silva-Trujillo   +4 more
doaj   +1 more source

Deep Web Users Deanonimization System

open access: yesТруды Института системного программирования РАН, 2018
Privacy enhancing technologies (PETs) are ubiquitous nowadays. They are beneficial for a wide range of users: for businesses, journalists, bloggers, etc. However, PETs are not always used for legal activity.
S. M. Avdoshin, A. V. Lazarenko
doaj   +1 more source

An improved anonymous authentication scheme for roaming in ubiquitous networks. [PDF]

open access: yesPLoS ONE, 2018
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere.
Hakjun Lee   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy