نتایج جستجو برای: Anonymity

تعداد نتایج: 5605  

2000
Oliver Berthold Andreas Pfitzmann Ronny Standtke

There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two special configurations: a fixed MIX route used by all participants and a network of freely usable MIXes where each participant chooses his own route. The advantages and disadvantages in respect to the freedom of choice a...

Journal: :The Iowa Review 2004

2009
Joel Paulsson Charlotta Westberg David Byers

Due to recent happenings in the world, such as the implementation of Internet laws, network anonymity has become a highly controversial subject. This report is a brief inventory of technologies and reasons for anonymity, and is based on literature studies and some basic testing through existing tests. It also covers whether or not anonymous networks truly are anonymous and how difficult it is t...

2010
C. Bram Cadsby Fei Song

Employing a two-by-two factorial design that manipulates whether dictator groups are single or mixed-sex and whether procedures are single or double-blind, we examine gender effects in a standard dictator game. No gender effects were found in any of the experimental treatments for the mean or median levels of giving, or for the propensity to give nothing. However, females chose to give away hal...

2005
Claudia Díaz

In 2001, two information theoretic anonymity metrics were proposed: the effective anonymity set size and the degree of anonymity. Here, we propose an abstract model for a general anonymity system which is consistent with the definition of anonymity on which the metrics are based. We revisit entropybased anonymity metrics, and we apply them to Crowds, a practical anonymity system. We discuss the...

2003
George Danezis Roger Dingledine Nick Mathewson

We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages, so forward and reply messages share the same anonymity set. We add directory servers that allow users to learn public keys and performance statistics of participating remailers, and we describe nymservers that provide...

Journal: :J. Network and Computer Applications 2009
Thomas E. Carroll Daniel Grosu

Despite the massive improvements in technology the goal of having accurate, anonymous and voter-verifiable elections has not yet been realized. The existing electronic voting schemes that provide secret voter-verifiable receipts are based on ‘classical’ mix-nets. These mix-nets approaches do not scale well and are designed to provide a fixed degree of anonymity which cannot be increased by the ...

2007
Francisco Alpizar Fredrik Carlsson Olof Johansson-Stenman

We investigate the importance of the social context for people’s voluntary contributions to a national park in Costa Rica, using a natural field experiment. Some subjects make actual contributions while others state their hypothetical contribution. Both the degree of anonymity and provided information about the contributions of others influence subject contributions in the hypothesized directio...

Journal: :Online Journal of Health Ethics 2011

Journal: :Computer Standards & Interfaces 2008
Vicente Benjumea Javier López José M. Troya

Anonymity has been formalized and some metrics have been defined in the scope of anonymizing communication channels. In this paper, such formalization has been extended to cope with anonymity in those scenarios where users must anonymously prove that they own certain privileges to perform remote transactions. In these types of scenarios, the authorization policy states the privileges required t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید