Anonymous Communication in Organizations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Communication and Anonymous Cash

We propose considering the problem of electronic cash i n the context of a network in which anonymous, untraceable commiinicatlon is assumed to be possible. We present a formal model for such a network, and define security criteria for an electronic cash system in such a setting. Finally, we show that there exists a remarkably simple electrortic cash system which meets the security criteria of ...

متن کامل

Systems for Anonymous Communication

We present an overview of the field of anonymous communications, from its establishment in 1981 by David Chaum to today. Key systems are presented categorized according to their underlying principles: semitrusted relays, mix systems, remailers, robust & verifiable mixes, and onion routing systems. We include extended discussions of the threat models and usage models that different schemes provi...

متن کامل

Anonymous Quantum Communication

We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corr...

متن کامل

Accountable Anonymous Communication

In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement. We describe the main building blocks for anonymous communication and for anonymity revocation. We expl...

متن کامل

Communication-eecient Anonymous Group Identiication

Identiication schemes allow a user to identify herself to a verifying authority in a secure way (i.e., without revealing her secret key). Group identiication schemes allow a user to identify herself as a member of a group of users in a secure and anonymous way (i.e., without revealing her identity nor her secret key). Several identiication schemes and group identiication schemes have been propo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Management Communication Quarterly

سال: 2005

ISSN: 0893-3189,1552-6798

DOI: 10.1177/0893318905279191