نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

2005
Zhaofeng Ma Xibin Zhao Zhi Guo Ming Gu Jia-Guang Sun

A new anonymous secure communication protocol with conditional traceability is proposed to provide personal anonymity and privacy protection, in which a secure mapping function is introduced to provide anonymity and personal information protection, when necessary, only authority principal part can act as arbitrator for communication validation. The proposed protocol has 3 advantages: 1) mutual ...

Journal: :IEEE Trans. Knowl. Data Eng. 2001
Pierangela Samarati

Today’s globally networked society places great demand on the dissemination and sharing of information. While in the past released information was mostly in tabular and statistical form, many situations call today for the release of specific data (microdata). In order to protect the anonymity of the entities (called respondents) to which information refers, data holders often remove or encrypt ...

Journal: :Inf. Comput. 2006
Konstantinos Chatzikokolakis Catuscia Palamidessi Prakash Panangaden

We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider th...

2006
Russell Haines Lan Cao Douglas Haines

This paper reports the results of an experiment where anonymous and identified comment groups discussed five ethical issues via computer-mediated communication (CMC). The results suggest that comment anonymity leads to more participation and less change in opinion than comment identification, while equality of participation and post-discussion agreement do not differ. Further analysis of the ch...

2014
Rashmi Joshi

Source anonymity problem creates lot of security leakages in certain sensitive applications. This problem has emerged as important research area in wireless sensor networks. In this system we developed a new framework by statistical framework for source anonymity. The new things in proposed frameworks are first to introduce a novel idea of “interval indistinguishability” and provides a quantita...

2005
Ying Wang

For many internet applications, it may be advantageous or essential and even critical to protect the identity of participants. Anonymous communication strategies mostly shield the sender of messages from identification. This paper presents a protocol for anonymous communication over internet that can also provide receiver anonymity. Our system is designed to provide anonymity under a rather str...

Journal: :Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society 2007
Wen-Bin Chiou

This study examined the effects of anonymity and topic intimacy on adolescents' reply intent for cyber partners' sexual disclosure on the Internet. Two hundred thirty-seven Taiwanese adolescents with sexual self-disclosure experiences on the Internet participated in an experimental study. Regardless of anonymity and topic intimacy, male adolescents were more willing than females to respond to c...

Journal: :Human reproduction 2007
Lucy Frith Eric Blyth Abigail Farrand

BACKGROUND In 2005, UK legislation was changed requiring any donor of gametes or embryos used in the treatment of others to agree to the disclosure of their identity to any offspring reaching the age of 18. METHODS AND RESULTS This paper analyses responses of a survey of existing donors' views on the removal of donor anonymity that was undertaken by the Department of Health (UK) as part of it...

2006
Ahmet Burak Can Bharat Bhargava

Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity is protected as long as they perform only passive attacks. An encryption scheme ensures that pee...

2010
Rob Jansen Robert Beverly

Research on Delay and Disruption Tolerant Networks (DTNs) challenges the traditional assumption of end-toend connectivity, extending networked communication to e.g. intermittently connected devices, ad-hoc mobile environments, first-responder disaster scenarios, etc. In such environments, ensuring the security and privacy of both content, networks, and participants is often vital. In this work,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید