Comprehensive Anonymity Trilemma: User Coordination is not enough

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency—Choose Two

This work investigates the fundamental constraintsof anonymous communication (AC) protocols. We analyze therelationship between bandwidth overhead, latency overhead, andsender anonymity or recipient anonymity against the globalpassive (network-level) adversary. We confirm the trilemma thatan AC protocol can only achieve two out of the following threeproperties: strong an...

متن کامل

Not Enough Points Is Enough

Models of the untyped λ-calculus may be defined either as applicative structures satisfying a bunch of first order axioms, known as “λ-models”, or as (structures arising from) any reflexive object in a cartesian closed category (ccc, for brevity). These notions are tightly linked in the sense that: given a λ-model A, one may define a ccc in which A (the carrier set) is a reflexive object; conve...

متن کامل

When Enough Is Not Enough

People are often exposed to more information than they can actually remember. Despite this frequent form of information overload, little is known about how much information people choose to remember. Using a novel “stop” paradigm, the current research examined whether and how people choose to stop receiving new—possibly overwhelming—information with the intent to maximize memory performance. Pa...

متن کامل

Correctness is not enough

The usual aim of spreadsheet audit is to verify correctness. There are two problems with this: first, it is often difficult to tell whether the spreadsheets in question are correct, and second, even if they are, they may still give the wrong results. These problems are explained in this paper, which presents the key criteria for judging a spreadsheet and discusses how those criteria can be achi...

متن کامل

Translation Is Not Enough

ED INLINE CODES Inline codes, such as markers for bold or italics, links information or image references, can be represented using either an encapsulation mechanism or a placeholder method. Those are derived respectively from TMX and OpenTag. The encapsulation mechanism consists of bracketing the inline codes between special elements. XLIFF keeps a syntax very close to TMX: (begin paired-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2020

ISSN: 2299-0984

DOI: 10.2478/popets-2020-0056