• No results found

Anonymous Users

Profile Matching Of Anonymous Users in Multiple Social Media Networks

Profile Matching Of Anonymous Users in Multiple Social Media Networks

... The SMN proves to be the best platform for information retrieval. However, identifying unknown and identical users on multiple social media application is still an unsolved problem. People use different social ...

6

Identifying the Anonymous Users in Multiple Social Media Cross Platform Networks

Identifying the Anonymous Users in Multiple Social Media Cross Platform Networks

... by users withdifferent purposes, most current user identification resolutions, which mainlyfocus on text mining of users’ public profiles, are ...identical users tend to set up partial ...

8

Detecting Unknown or Fake User Accounts on Different Micro blogging and Social Media Networks

Detecting Unknown or Fake User Accounts on Different Micro blogging and Social Media Networks

... matching anonymous users across different SMN platforms will give integrated details on every user and inform corresponding laws, like targeting services ...

5

Fair Exchange and Anonymous E-Commerce by Deploying Clone-Resistant Tokens

Fair Exchange and Anonymous E-Commerce by Deploying Clone-Resistant Tokens

... A fair and anonymous electronic e-commerce system dealing with e-goods on open networks is presented. The key operating entities of the transactions are physical clone- resistant Commercial Hardware-Tokens (CHTs) ...

6

Information Security Threat, Social Networks, Anonymity, Web 2.0.

Information Security Threat, Social Networks, Anonymity, Web 2.0.

... interactive users who collaborate in the flow of creativity, has brought with it abundant anonymous users (abusers) who cannot be held accountable for their actions and thus are able to perpetuate ...

5

Dark Web and Its Impact in Online Anonymity and Privacy:  A Critical Analysis and Review

Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review

... are anonymous and ...daily anonymous users of the Dark Web (using TOR) in Kosovo as well as in the whole world for a period of ...of users and in which place(s) they ...Web users. The ...

14

Locating the Source of Message Diffusion in the Anonymous Network

Locating the Source of Message Diffusion in the Anonymous Network

... In this paper, we propose a new approach to help us locate the possible senders of a particular message in an anonymous network. To the best of our knowledge, we are the first to use the message propagation model ...

6

Control Identity Leakage in Cloud Data and Achieve the Full Anonymity

Control Identity Leakage in Cloud Data and Achieve the Full Anonymity

... Data security is one of the aspects of the cloud which prohibit users from using cloud services [2]. There is fear between the data owner’s especially in large organizations that their data possibly misuse by the ...

5

K Anonymization using Multidimensional Suppression for Data De identification

K Anonymization using Multidimensional Suppression for Data De identification

... Previous generalization is not enough to produce tables with adequate privacy protection. Suppression is necessary to produce tables with sufficient privacy protection. We have not used generalization since the domain ...

5

The Hierarchical Ad Hoc Networks Anonymous Routing Scheme

The Hierarchical Ad Hoc Networks Anonymous Routing Scheme

... paper will introduce a new anonymous routing scheme which has three advantages: (1) it can provides not only anonymity to the route from source to destination, but sender anonymity. (2) it is suitable for ...

5

Collaborative learning about e-health for mental health professionals and service users in a structured anonymous online short course: pilot study

Collaborative learning about e-health for mental health professionals and service users in a structured anonymous online short course: pilot study

... service users to take part and collaborate in a one-week anonymous online ...service users, suggesting further study with a fully powered sample size is ...

8

Using VPN service against hacker espionage

Using VPN service against hacker espionage

... using anonymous networks. By anonymous networks means access to a global network using VPN (Virtual Private Network), web proxy and an anonymous network against hacker ...

5

[D583.Ebook] Download PDF A Day At A Time Gamblers Anonymous By Anonymous.pdf

[D583.Ebook] Download PDF A Day At A Time Gamblers Anonymous By Anonymous.pdf

... Gamblers Anonymous By Anonymous, nowadays, will not compel you to constantly buy in the store ...Gamblers Anonymous By Anonymous by ...Gamblers Anonymous By Anonymous will ...

7

Privacy Preserving Data Reporting Protocol Using Slot Reservation Scheme

Privacy Preserving Data Reporting Protocol Using Slot Reservation Scheme

... The user privacy preserving is one of the main issue in the networking and participatory applications. Here we propose an efficient and better anonymous data reporting tool or protocol for the participatory ...

5

Recommendations for Disciplinary Processes into Staff Sexual Misconduct in UK Higher Education

Recommendations for Disciplinary Processes into Staff Sexual Misconduct in UK Higher Education

... ● Where investigations are launched after third party or anonymous reports, students and staff have no obligation to participate in the investigation process or to give evidence to a hearing. It is entirely up to ...

11

*Swathy G, Sakthivel K, Ismail AM, Wasim Raja S

*Swathy G, Sakthivel K, Ismail AM, Wasim Raja S

... The studies on “Clinical comparison of the efficacy and safety of Bimatoprost/Timolol (Anonymous 4, 5) combination and Travoprost/Timolol(Anonymous 5, 6) combination in glaucoma patients” were carried out ...

13

GB64 00A adminCmds Sec 3 10 Nov86 pdf

GB64 00A adminCmds Sec 3 10 Nov86 pdf

... The list of valid attributes is supplied below: guaranteed_login users can use the -force argument to the login command to bypass load control anonymous The project can have anonymous us[r] ...

397

Anonymous Web Browsing and Hosting

Anonymous Web Browsing and Hosting

... In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In ...

9

Anonymous single profile welfarism

Anonymous single profile welfarism

... is anonymous if and only if it declares any two utility vectors in the set of attainable utility vectors to be equally good whenever one is a permutation of the ...

11

Scalable and Anonymous Group Communication

Scalable and Anonymous Group Communication

... existing anonymous multicast schemes provide provable (unconditional) anonymity guarantees, but at the cost of limited performance or requiring that the group’s composition be ...wide-area anonymous group ...

98

Show all 10000 documents...

Related subjects