• No results found

Communication and Anonymity/Identity

Identity Based Encryption Anonymous Communication on the Internet

Identity Based Encryption Anonymous Communication on the Internet

... Besides the above three form of vagueness, other forms have also been purposeful, such as bump confidentiality, replacement shadows, Unobservability, inclusive obscurity Computational secrecy, demonstrable obscurity, ...

5

Fine-Grained Privilege Control and Identity Anonymity Control Based on User Identity Information

Fine-Grained Privilege Control and Identity Anonymity Control Based on User Identity Information

... This paper proposes a semi-nameless attribute-Based privilege manage scheme AnonyControl and a thoroughly- anonymous attribute-based privilege control scheme AnonyControl-F to handle the user privateness hindrance in a ...

5

Privacy and Identity Management for Vehicular Communication Systems: a Position Paper

Privacy and Identity Management for Vehicular Communication Systems: a Position Paper

... VC-specific communication, nonetheless, is at a rel- atively high rate; some representative widely accepted value: at least one message generated per node every 200 or 300 ...if anonymity is ...

5

Anonymity Effects and Implications in the Virtual Environment: From Crowd to Computer Mediated Communication

Anonymity Effects and Implications in the Virtual Environment: From Crowd to Computer Mediated Communication

... that anonymity promotes negative anti-social ...case. Anonymity can also produce positive effects and promote pro- social ...and anonymity actually reduces the interpersonal differences within groups ...

18

Control Identity Leakage in Cloud Data and Achieve the Full Anonymity

Control Identity Leakage in Cloud Data and Achieve the Full Anonymity

... also identity anonymity while conducting privilege control based on users’ identity ...extra communication overhead is incurred during the 1-out-of-n oblivious ...

5

Formalizing anonymity : A review

Formalizing anonymity : A review

... total anonymity is very much a two- edged ...web, anonymity can be a highly desirable ...Sometimes identity needs to be tracked over the course of an extended transac- tion, but not between ...

65

Formal Privacy Analysis of Communication Protocols for Identity Management

Formal Privacy Analysis of Communication Protocols for Identity Management

... compared identity-related properties, e.g., anonymity, pseudonymity and ...from communication as it does not allow inter- pretation of personal information in terms of how it was learned or what it ...

15

Establishing the Anonymity to Mitigate Identity Based Attacks

Establishing the Anonymity to Mitigate Identity Based Attacks

... of IDENTITY ATTACKS locally and independently, but neighboring nodes can collaboratively investigate in a broader ...and Communication activities within the radio ...detects IDENTITY ATTACKS from ...

13

AORPM- Anonymity of Routing Path in MANETs

AORPM- Anonymity of Routing Path in MANETs

... days communication between mobile nodes was mainly based on public ...node identity and providing anonymity for the routing path is very much essential due to security ...the communication was ...

7

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing

... In this paper, we focus on a study on the k-anonymity prop- erty [11, 10]. The k-anonymity model assumes a quasi-identifier, which is a set of attributes that may serve as an identifier in the data set. It ...

6

An Analysis of Anonymity in the Zcash Cryptocurrency

An Analysis of Anonymity in the Zcash Cryptocurrency

... [Mic00]’s computationally sound proofs were the first appearance of what we now call zk- SNARKs, although the explicit formulation used here had not been defined yet. [Gro10] first improved upon [Mic00] by detailing a ...

58

Traffic Analysis of anonymity Network

Traffic Analysis of anonymity Network

... In real world scenarios, there maybe various ways to entice a Tor client to connect to such malicious servers. Tempting commercials on a website, luring a Tor client to click on, could be one such tactic. This could ...

19

An Empirical Analysis of Anonymity in Zcash.

An Empirical Analysis of Anonymity in Zcash.

... Since the introduction of Bitcoin in 2008 [34], cryptocur- rencies have become increasingly popular to the point of reaching a near-mania, with thousands of deployed cryp- tocurrencies now collectively attracting ...

16

Securing Broker-Less Communication Using Identity Based Encryption

Securing Broker-Less Communication Using Identity Based Encryption

... [1] In substance based open subscribe frameworks data concerning an occasion (i.e. substance of message) figures out where the message is conveyed. Senders send messages [r] ...

6

Identity the relationship between communication styles of managers and job involvement

Identity the relationship between communication styles of managers and job involvement

... of communication such as printed note cards Perforated and used, but must be the main form of business communication, oral and other forms of communication to face-to-face, distinct role contribution ...

9

Anonymity and Surveillance in New Jersey

Anonymity and Surveillance in New Jersey

... In 1779, the upper house of the New Jersey State Legislature attempted to punish the author of a satirical attack on the Governor and the College of New Jersey (now Princeton), who had signed his work “Cincinnatus.” ...

6

Trading anonymity and order anticipation

Trading anonymity and order anticipation

... Order anticipation should be a greater concern for dynamic traders of small stocks than for those trading large stocks because the low natural trading interest in small caps makes repeat traders easier to isolate and ...

61

Trading anonymity and order anticipation

Trading anonymity and order anticipation

... Permanent repository link: http://openaccess.city.ac.uk/5165/ Link to published version: http://dx.doi.org/10.1016/j.finmar.2014.07.002 Copyright and reuse: City Research Online aims to [r] ...

6

Simulation of Anonymity Network Model

Simulation of Anonymity Network Model

... then anonymity of Tor client will get compromised which means ip address of user’s computer will be noted at Website ...advance anonymity to the Tor ...on anonymity model using ...

6

Speech strategy of anonymity in communication

Speech strategy of anonymity in communication

... business communication and complaints against a neighbor in the practice of interpersonal social interaction are often implemented through the tactic of anonymous ...

6

Show all 10000 documents...

Related subjects