نتایج جستجو برای: anonymity
تعداد نتایج: 5605 فیلتر نتایج به سال:
A new anonymous secure communication protocol with conditional traceability is proposed to provide personal anonymity and privacy protection, in which a secure mapping function is introduced to provide anonymity and personal information protection, when necessary, only authority principal part can act as arbitrator for communication validation. The proposed protocol has 3 advantages: 1) mutual ...
Today’s globally networked society places great demand on the dissemination and sharing of information. While in the past released information was mostly in tabular and statistical form, many situations call today for the release of specific data (microdata). In order to protect the anonymity of the entities (called respondents) to which information refers, data holders often remove or encrypt ...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider th...
This paper reports the results of an experiment where anonymous and identified comment groups discussed five ethical issues via computer-mediated communication (CMC). The results suggest that comment anonymity leads to more participation and less change in opinion than comment identification, while equality of participation and post-discussion agreement do not differ. Further analysis of the ch...
Source anonymity problem creates lot of security leakages in certain sensitive applications. This problem has emerged as important research area in wireless sensor networks. In this system we developed a new framework by statistical framework for source anonymity. The new things in proposed frameworks are first to introduce a novel idea of “interval indistinguishability” and provides a quantita...
For many internet applications, it may be advantageous or essential and even critical to protect the identity of participants. Anonymous communication strategies mostly shield the sender of messages from identification. This paper presents a protocol for anonymous communication over internet that can also provide receiver anonymity. Our system is designed to provide anonymity under a rather str...
This study examined the effects of anonymity and topic intimacy on adolescents' reply intent for cyber partners' sexual disclosure on the Internet. Two hundred thirty-seven Taiwanese adolescents with sexual self-disclosure experiences on the Internet participated in an experimental study. Regardless of anonymity and topic intimacy, male adolescents were more willing than females to respond to c...
BACKGROUND In 2005, UK legislation was changed requiring any donor of gametes or embryos used in the treatment of others to agree to the disclosure of their identity to any offspring reaching the age of 18. METHODS AND RESULTS This paper analyses responses of a survey of existing donors' views on the removal of donor anonymity that was undertaken by the Department of Health (UK) as part of it...
Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity is protected as long as they perform only passive attacks. An encryption scheme ensures that pee...
Research on Delay and Disruption Tolerant Networks (DTNs) challenges the traditional assumption of end-toend connectivity, extending networked communication to e.g. intermittently connected devices, ad-hoc mobile environments, first-responder disaster scenarios, etc. In such environments, ensuring the security and privacy of both content, networks, and participants is often vital. In this work,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید