Results 61 to 70 of about 496,765 (185)
Generative adversarial networks for anonymous acneic face dataset generation.
It is well known that the performance of any classification model is effective if the dataset used for the training process and the test process satisfy some specific requirements.
Hazem Zein +3 more
doaj +3 more sources
An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate
Cheng Zhong, Lei Liu, Jing Zhao
doaj +1 more source
Trust in Anonymity Networks [PDF]
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies.
Sassone, Vladimiro +2 more
openaire +2 more sources
Stable and Efficient Networks with Farsighted Players: the Largest Consistent Set [PDF]
In this paper we study strategic formation of bilateral networks with farsighted players in the classic framework of Jackson and Wolinsky (1996). We use the largest consistent set (LCS)(Chwe (1994)) as the solution concept for stability.
A Bhattacharya
core
Digital and Mobile Security for Mexican Journalists and Bloggers [PDF]
A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked.
Jorge Luis Sierra
core
Optimal Active Social Network De-anonymization Using Information Thresholds
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query ...
Erkip, E., Garg, S., Shirani, F.
core +1 more source
Security flaws and improvement to a wireless authentication protocol with anonymity
The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed.
PENG Hua-xi, FENG Deng-guo
doaj +2 more sources
On deterministic counting in anonymous dynamic networks [PDF]
Nella tesi di dottorato si analizza il problema del counting in reti anonime dinamiche ed interval connesse. Vengono dimostrati lower bound non triviali sul tempo di conteggio in reti a diametro costante.
DI LUNA, GIUSEPPE ANTONIO
core +1 more source
Path selection algorithm with minimal delay in wireless sensor networks
With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy security. Anonymous communication technology has gradually become people’s focus.
Tianbo Lu +4 more
doaj +1 more source
gap – Practical Anonymous Networking [PDF]
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.
Krista Bennett, Christian Grothoff
openaire +1 more source

