Results 61 to 70 of about 496,765 (185)

Generative adversarial networks for anonymous acneic face dataset generation.

open access: yesPLoS ONE
It is well known that the performance of any classification model is effective if the dataset used for the training process and the test process satisfy some specific requirements.
Hazem Zein   +3 more
doaj   +3 more sources

Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

open access: yesThe Scientific World Journal, 2014
An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate
Cheng Zhong, Lei Liu, Jing Zhao
doaj   +1 more source

Trust in Anonymity Networks [PDF]

open access: yes, 2010
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies.
Sassone, Vladimiro   +2 more
openaire   +2 more sources

Stable and Efficient Networks with Farsighted Players: the Largest Consistent Set [PDF]

open access: yes
In this paper we study strategic formation of bilateral networks with farsighted players in the classic framework of Jackson and Wolinsky (1996). We use the largest consistent set (LCS)(Chwe (1994)) as the solution concept for stability.
A Bhattacharya
core  

Digital and Mobile Security for Mexican Journalists and Bloggers [PDF]

open access: yes, 2013
A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked.
Jorge Luis Sierra
core  

Optimal Active Social Network De-anonymization Using Information Thresholds

open access: yes, 2018
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query ...
Erkip, E., Garg, S., Shirani, F.
core   +1 more source

Security flaws and improvement to a wireless authentication protocol with anonymity

open access: yesTongxin xuebao, 2006
The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed.
PENG Hua-xi, FENG Deng-guo
doaj   +2 more sources

On deterministic counting in anonymous dynamic networks [PDF]

open access: yes, 2015
Nella tesi di dottorato si analizza il problema del counting in reti anonime dinamiche ed interval connesse. Vengono dimostrati lower bound non triviali sul tempo di conteggio in reti a diametro costante.
DI LUNA, GIUSEPPE ANTONIO
core   +1 more source

Path selection algorithm with minimal delay in wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy security. Anonymous communication technology has gradually become people’s focus.
Tianbo Lu   +4 more
doaj   +1 more source

gap – Practical Anonymous Networking [PDF]

open access: yes, 2003
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.
Krista Bennett, Christian Grothoff
openaire   +1 more source

Home - About - Disclaimer - Privacy