• No results found

Anonymity and Trust

An analysis of trust in anonymity networks in the presence of adaptive attackers

An analysis of trust in anonymity networks in the presence of adaptive attackers

... members’ trust in them, while maintaining their apparent good ...low trust levels, while attackers might see their repu- tation increased, and so they increase their probability of being trusted by ...

28

Trust in Anonymity Networks

Trust in Anonymity Networks

... This means that if the probability of detection is small, as in this case, systems may be classified as statistically secure even when one such detection event may lead to complete exposure for some initiators, as in ...

23

Understanding Anonymity

Understanding Anonymity

... of trust and ...that anonymity at the level of the press, radio, TV, films and other media technologies such as the Internet is crucial to our continuing sobriety and growth — at both the personal and group ...

16

ANONYMITY IN THE SWARM:

ANONYMITY IN THE SWARM:

... Encrypted Email: An Overview Encrypting your email is the most powerful way to reasonably keep your communications private and secure. There are two ways to encrypt your email communications: by setting up the ability to ...

50

Anonymity vs. traceability : revocable anonymity in remote electronic voting protocols

Anonymity vs. traceability : revocable anonymity in remote electronic voting protocols

... Alice’s anonymity and take further action against ...Alice’s anonymity, we add a trust requirement that R does not collude with T to reveal Alice’s identity, and always provides the correct identity ...

232

Formalizing anonymity : A review

Formalizing anonymity : A review

... When the transaction is completed, both the buyer and the seller are encour- aged to leave feedback concerning the behaviour of the other party in the trans- action. This feedback takes the form of a positive, neutral or ...

65

Anonymity in Bitcoin and Bitmessage

Anonymity in Bitcoin and Bitmessage

... of trust that can be used for authentication without relying on a trusted third ...provide anonymity or prevent traffic analysis—in fact, part of its security depends on a huge public graph of the ...

46

Anonymity Analysis of Cryptocurrencies

Anonymity Analysis of Cryptocurrencies

... Researchers at University of California, San Diego and George Mason Univer- sity [14] performed analysis on change addresses in a Bitcoin transaction. They used the assumption that a one-time change address is controlled ...

61

The social productivity of anonymity

The social productivity of anonymity

... between anonymity and identity (which is an almost subterranean motive in HHWS, but not explicitly theorised by Coleman herself) also brought me to change my mind concerning the assumption that Anonymous as a ...

226

Anonymity with Identity Escrow

Anonymity with Identity Escrow

... Anonymity with identity escrow Escrow Escrow is a legal arrangement whereby an asset (often money, but sometimes other property such as art, a deed of title, website, or software source code) is delivered to a ...

20

Speech strategy of anonymity in communication

Speech strategy of anonymity in communication

... It may seem that it is impossible to trust information submitted in this way. However, it is precisely the persistent and self-exposing repetition of these linguistic units that transforms the addresser’s speech ...

6

An Analysis of Tools for Online Anonymity

An Analysis of Tools for Online Anonymity

... few anonymity technologies could be due to the cost of developing these technologies for public ...use. Anonymity technologies cost money to develop, run, and ...of trust from the user that this ...

21

A Coding Enabled Anonymity Network

A Coding Enabled Anonymity Network

... of anonymity. Anonymizer [1] and JAP [3] provide anonymity by aggregating the traffic from different ...the anonymity and the confidentially provided are slightly weaker than in systems that use ...

75

Anonymity and Surveillance in New Jersey

Anonymity and Surveillance in New Jersey

... Refusing, Collins said “Were I to comply, I conceive I should betray the trust reposed in me, and be far from acting as a faithful guardian of the Liberty of the Press.” By 1784, the same Governor of New Jersey, ...

6

The "witness anonymity" and "investigation anonymity" provisions

The "witness anonymity" and "investigation anonymity" provisions

... Under the DPP's Guidance this authorisation must be given specifically by the Head of the Complex Casework Unit or the Head of HQ Casework Division. 42 Additionally, the Attorney General's Guidelines provide that a ...

18

Images of anonymity

Images of anonymity

... Portrait parlé. The concept of a personal identity which is disrupted by anonymity, is itself an invention of the modern era of Western civilisation. According to Michel Foucault, the emergent forms of ...

21

Anonymity & Monitoring:

Anonymity & Monitoring:

... of anonymity and whether the network is providing sufficient anonymity or ...high anonymity it might be better to avoid Italy in all circuits at ...

16

The celebrity of anonymity and the anonymity of celebrity:picture identification and nineteenth century British authorship

The celebrity of anonymity and the anonymity of celebrity:picture identification and nineteenth century British authorship

... protagonist. When her literary idol, William Makepeace Thackeray, introduced her as Jane Eyre, she protested vehemently, insisting that she would never introduce Thackeray as one of his characters (Smith 1900, pp. ...

31

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

... The overhead factor remains at zero in the links between cascade nodes, as all circuits are multiplexed over a single link; and it remains constant at the network edges, as circuits rout[r] ...

18

Postcode Anonymity Analysis

Postcode Anonymity Analysis

... 2 Anonymity Analysis 2.1 Anonymity Threshold For our anonymity analysis we are most concerned about small groups, as they are most likely to contain non-anonymous ...an anonymity threshold, ...

5

Show all 10000 documents...

Related subjects