Comprehensive Anonymity Trilemma: User Coordination is not enough
نویسندگان
چکیده
منابع مشابه
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency—Choose Two
This work investigates the fundamental constraintsof anonymous communication (AC) protocols. We analyze therelationship between bandwidth overhead, latency overhead, andsender anonymity or recipient anonymity against the globalpassive (network-level) adversary. We confirm the trilemma thatan AC protocol can only achieve two out of the following threeproperties: strong an...
متن کاملNot Enough Points Is Enough
Models of the untyped λ-calculus may be defined either as applicative structures satisfying a bunch of first order axioms, known as “λ-models”, or as (structures arising from) any reflexive object in a cartesian closed category (ccc, for brevity). These notions are tightly linked in the sense that: given a λ-model A, one may define a ccc in which A (the carrier set) is a reflexive object; conve...
متن کاملWhen Enough Is Not Enough
People are often exposed to more information than they can actually remember. Despite this frequent form of information overload, little is known about how much information people choose to remember. Using a novel “stop” paradigm, the current research examined whether and how people choose to stop receiving new—possibly overwhelming—information with the intent to maximize memory performance. Pa...
متن کاملCorrectness is not enough
The usual aim of spreadsheet audit is to verify correctness. There are two problems with this: first, it is often difficult to tell whether the spreadsheets in question are correct, and second, even if they are, they may still give the wrong results. These problems are explained in this paper, which presents the key criteria for judging a spreadsheet and discusses how those criteria can be achi...
متن کاملTranslation Is Not Enough
ED INLINE CODES Inline codes, such as markers for bold or italics, links information or image references, can be represented using either an encapsulation mechanism or a placeholder method. Those are derived respectively from TMX and OpenTag. The encapsulation mechanism consists of bracketing the inline codes between special elements. XLIFF keeps a syntax very close to TMX: (begin paired-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2020
ISSN: 2299-0984
DOI: 10.2478/popets-2020-0056