Showing 61 - 80 results of 426 for search '"Anonymity"', query time: 0.05s Refine Results
  1. 61

    KPDR : An Effective Method of Privacy Protection by Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu, Peiqian Liu

    Published 2021-01-01
    “…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
    Get full text
    Article
  2. 62

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. …”
    Get full text
    Article
  3. 63

    Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers by Víctor Pérez-Cano, Francisco Jurado

    Published 2025-01-01
    “…However, this growth has brought several challenges due to the features of these networks, specifically anonymity and decentralization. One of these challenges is the fight against fraudulent activities performed in these networks, which, among other things, involve financial schemes, phishing attacks or money laundering. …”
    Get full text
    Article
  4. 64

    An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing by Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee

    Published 2021-01-01
    “…The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. …”
    Get full text
    Article
  5. 65

    Internet chat based intervention as a mode for therapy and counselling by Jini K Gopinath, Marsha Rodrigues, Puneet Manuja

    Published 2025-01-01
    “…This study recognises the need for programmes that help in reachability and ease of access while simultaneously maintaining anonymity, therefore, analyses the impact of chat-based therapy provided online through the platform. …”
    Get full text
    Article
  6. 66

    Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates by Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso

    Published 2024-01-01
    “…Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. …”
    Get full text
    Article
  7. 67

    VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION by E. V. Batueva

    Published 2014-06-01
    “…Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. …”
    Get full text
    Article
  8. 68

    Online suicidal thoughts and/or behaviours talk: A scoping review protocol. by Andrea Lamont-Mills, Luke T Bayliss, Steven A Christensen

    Published 2022-01-01
    “…The anonymity that the internet and social media affords users means that suicidal thoughts and/or behaviours can be talked about with a sense of freedom and disinhibition that is often not possible in face-to-face contexts. …”
    Get full text
    Article
  9. 69

    The Poisson Extension of the Unrelated Question Model: Improving Surveys With Time-Constrained Questions on Sensitive Topics by Benedikt Iberl, Anesa Aljovic, Rolf Ulrich, Fabiola Reiber

    Published 2024-04-01
    “…The UQM is another survey technique which guarantees complete and objective anonymity to participants in order to achieve more valid survey results when asking sensitive questions (e.g., about drug use). …”
    Get full text
    Article
  10. 70

    Voices of change: experiences of early women urology residents — a single institution qualitative research study by Aurora J. Grutman

    Published 2025-02-01
    “…Participants were provided written consent and assured of anonymity. In semi-structured interviews guided by a set of IRB-approved questions, participants discussed personal backgrounds, medical school experiences, and residency experiences. …”
    Get full text
    Article
  11. 71

    Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology by Shanshen Li, Xin Jing

    Published 2020-01-01
    “…The amazing rise of digital currency is not only favored by investors but also attractive to lawbreakers for its anonymity and decentralization. This paper mainly discusses the intelligent digital currency and dynamic coding service system based on Internet of Things technology. …”
    Get full text
    Article
  12. 72

    Prediction of Trolling behavior from sadism and Internet addiction in young adults of Buenos Aires by Pablo Christian González Caino, Santiago Resett

    Published 2020-12-01
    “…Conclusion: Sadism is an important predictor for trolling behavior over the internet, where individuals with these characteristics take advantage of anonymity to carry out their aggressive behaviors.…”
    Get full text
    Article
  13. 73

    Practical epistemology: the role of peer review in organizing scientific research by A. V. Shestopal, V. I. Konnov

    Published 2014-02-01
    “…The authors also consider the main procedural elements - preparation of individual reviews, consideration by panels, anonymity of reviewers. Finally the article addresses the problems of peer review such as non-transparent process, elitism in selecting reviewers, conservativeness of decisions, and possible ways of handling these problems.…”
    Get full text
    Article
  14. 74

    Hyperreality, simulacra and simulations in virtual space as a phenomenon of «antisocial» theory by Jean Baudrillard by V. Novikov, S. Kovaleva

    Published 2019-05-01
    “…The following interpretation of the characteristics of the Internet space has been proposed: a) the Internet can be considered within the framework of Jean Baudrillard’s concept as an example of antireality, since it is possible to preserve anonymity, invent a new life, use other people’s photos, etc.; b) communication in the virtual Internet is, in its essence, a simulation of communication, that is, its surrogate (simulacrum); in this case, the former contact form of communication is replaced by indirect – communication is carried out through social networks and messengers; c) there is a depletion of content and primitivization of expression of emotions, as in virtual communication uses a set of standard phrases, standard themes, emoticons, pictures, exchange of memes and other simulacra that are included in everyday social practices. …”
    Get full text
    Article
  15. 75

    RMGANets: reinforcement learning-enhanced multi-relational attention graph-aware network for anti-money laundering detection by Qianyu Wang, Wei-Tek Tsai, Bowen Du

    Published 2024-11-01
    “…Abstract Given the anonymity and complexity of illegal transactions, traditional deep-learning methods struggle to establish correlations between transaction addresses, cash flows, and physical users. …”
    Get full text
    Article
  16. 76

    BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data by Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

    Published 2022-03-01
    “…The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. …”
    Get full text
    Article
  17. 77

    Legal Aspects of Telepathology by Christian Dierks

    Published 2000-01-01
    “…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
    Get full text
    Article
  18. 78

    Signals of propaganda-Detecting and estimating political influences in information spread in social networks. by Alon Sela, Omer Neter, Václav Lohr, Petr Cihelka, Fan Wang, Moti Zwilling, John Phillip Sabou, Miloš Ulman

    Published 2025-01-01
    “…Social networks are a battlefield for political propaganda. Protected by the anonymity of the internet, political actors use computational propaganda to influence the masses. …”
    Get full text
    Article
  19. 79

    An Exploratory Investigation of Chatbot Applications in Anxiety Management: A Focus on Personalized Interventions by Alexia Manole, Răzvan Cârciumaru, Rodica Brînzaș, Felicia Manole

    Published 2024-12-01
    “…The advantages include increased accessibility without geographical or temporal limitations, reduced costs, and an anonymity that encourages openness and reduces stigma. …”
    Get full text
    Article
  20. 80

    Ensuring Security for the Participants of Criminal Proceedings: Forensic Aspects by T. P. Matiushkova

    Published 2020-12-01
    “…The few works of criminalists mainly reflect the problems of anonymity of interrogating the witnesses, recommendations on tactical features of the interrogation and identification by the means of videoconference. …”
    Get full text
    Article