Results 41 to 50 of about 496,765 (185)
K-In&Out-Degree Anonymity Method for Large Scale Social Networks [PDF]
Existing privacy protection techniques are inefficient when applied to directed graphs of large-scale social networks,and publishing anonymous data does not meet the needs of community structure analysis.To address the problem,this paper proposes a K-In ...
ZHANG Xiaolin, LIU Jiao, BI Hongjing, LI Jian, WANG Yongping
doaj +1 more source
Controllable and Anonymous Authentication Scheme for Space Networks
This paper analyzed the existing anonymous authentication schemes which have the weakness of high calculation and communication cost and weak security.
Hu Zhi-Yan, Du Xue-Hui, Cao Li-Feng
doaj +1 more source
Anonymous data collection scheme for cloud-aided mobile edge networks
With the rapid spread of smart sensors, data collection is becoming more and more important in Mobile Edge Networks (MENs). The collected data can be used in many applications based on the analysis results of these data by cloud computing. Nowadays, data
Anxi Wang +4 more
doaj +1 more source
Internet technologies have been designed from guidelines like the robustness principle also known as Postel's law. Jon Postel's law is described as: "Be conservative in what you do, be liberal in what you accept from others." Fundamentally, it advises protocol designs to be tolerant with what they accept from the other peers.
Rochet, Florentin +2 more
openaire +3 more sources
Non Trivial Computations in Anonymous Dynamic Networks [PDF]
In this paper we consider a static set of anonymous processes, i.e., they do not have distinguished IDs, that communicate with neighbors using a local broadcast primitive.
Baldoni, Roberto, Di Luna, Giuseppe
core +2 more sources
Perceptions and Use of Anonymous Communication across Cultures [PDF]
We use social networks to communicate, keep in touch and express our opinions in a manner that has become completely ubiquitous. However, this very ubiquity and ease of expression have exposed another, contentious side – one where nobody can remain ...
Lang, Guido, Mavlanova, Tamilla
core +1 more source
Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning
Anonymous networks, which aim primarily to protect user identities, have gained prominence as tools for enhancing network security and anonymity. Nonetheless, these networks have become a platform for adversarial affairs and sources of suspicious attack ...
Dazhou Liu, Younghee Park
doaj +1 more source
Messages sent across multiple platforms can be correlated to infer users’ attitudes, behaviors, preferences, lifestyles, and more. Therefore, research on anonymous communication systems has intensified in the last few years.
Alejandra Guadalupe Silva-Trujillo +4 more
doaj +1 more source
Deep Web Users Deanonimization System
Privacy enhancing technologies (PETs) are ubiquitous nowadays. They are beneficial for a wide range of users: for businesses, journalists, bloggers, etc. However, PETs are not always used for legal activity.
S. M. Avdoshin, A. V. Lazarenko
doaj +1 more source
An improved anonymous authentication scheme for roaming in ubiquitous networks. [PDF]
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere.
Hakjun Lee +6 more
doaj +1 more source

