-
61
KPDR : An Effective Method of Privacy Protection
Published 2021-01-01“…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
Get full text
Article -
62
A Secure RFID Authentication Protocol Adopting Error Correction Code
Published 2014-01-01“…Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. …”
Get full text
Article -
63
Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers
Published 2025-01-01“…However, this growth has brought several challenges due to the features of these networks, specifically anonymity and decentralization. One of these challenges is the fight against fraudulent activities performed in these networks, which, among other things, involve financial schemes, phishing attacks or money laundering. …”
Get full text
Article -
64
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. …”
Get full text
Article -
65
Internet chat based intervention as a mode for therapy and counselling
Published 2025-01-01“…This study recognises the need for programmes that help in reachability and ease of access while simultaneously maintaining anonymity, therefore, analyses the impact of chat-based therapy provided online through the platform. …”
Get full text
Article -
66
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. …”
Get full text
Article -
67
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01“…Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. …”
Get full text
Article -
68
Online suicidal thoughts and/or behaviours talk: A scoping review protocol.
Published 2022-01-01“…The anonymity that the internet and social media affords users means that suicidal thoughts and/or behaviours can be talked about with a sense of freedom and disinhibition that is often not possible in face-to-face contexts. …”
Get full text
Article -
69
The Poisson Extension of the Unrelated Question Model: Improving Surveys With Time-Constrained Questions on Sensitive Topics
Published 2024-04-01“…The UQM is another survey technique which guarantees complete and objective anonymity to participants in order to achieve more valid survey results when asking sensitive questions (e.g., about drug use). …”
Get full text
Article -
70
Voices of change: experiences of early women urology residents — a single institution qualitative research study
Published 2025-02-01“…Participants were provided written consent and assured of anonymity. In semi-structured interviews guided by a set of IRB-approved questions, participants discussed personal backgrounds, medical school experiences, and residency experiences. …”
Get full text
Article -
71
Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology
Published 2020-01-01“…The amazing rise of digital currency is not only favored by investors but also attractive to lawbreakers for its anonymity and decentralization. This paper mainly discusses the intelligent digital currency and dynamic coding service system based on Internet of Things technology. …”
Get full text
Article -
72
Prediction of Trolling behavior from sadism and Internet addiction in young adults of Buenos Aires
Published 2020-12-01“…Conclusion: Sadism is an important predictor for trolling behavior over the internet, where individuals with these characteristics take advantage of anonymity to carry out their aggressive behaviors.…”
Get full text
Article -
73
Practical epistemology: the role of peer review in organizing scientific research
Published 2014-02-01“…The authors also consider the main procedural elements - preparation of individual reviews, consideration by panels, anonymity of reviewers. Finally the article addresses the problems of peer review such as non-transparent process, elitism in selecting reviewers, conservativeness of decisions, and possible ways of handling these problems.…”
Get full text
Article -
74
Hyperreality, simulacra and simulations in virtual space as a phenomenon of «antisocial» theory by Jean Baudrillard
Published 2019-05-01“…The following interpretation of the characteristics of the Internet space has been proposed: a) the Internet can be considered within the framework of Jean Baudrillard’s concept as an example of antireality, since it is possible to preserve anonymity, invent a new life, use other people’s photos, etc.; b) communication in the virtual Internet is, in its essence, a simulation of communication, that is, its surrogate (simulacrum); in this case, the former contact form of communication is replaced by indirect – communication is carried out through social networks and messengers; c) there is a depletion of content and primitivization of expression of emotions, as in virtual communication uses a set of standard phrases, standard themes, emoticons, pictures, exchange of memes and other simulacra that are included in everyday social practices. …”
Get full text
Article -
75
RMGANets: reinforcement learning-enhanced multi-relational attention graph-aware network for anti-money laundering detection
Published 2024-11-01“…Abstract Given the anonymity and complexity of illegal transactions, traditional deep-learning methods struggle to establish correlations between transaction addresses, cash flows, and physical users. …”
Get full text
Article -
76
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01“…The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. …”
Get full text
Article -
77
Legal Aspects of Telepathology
Published 2000-01-01“…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
Get full text
Article -
78
Signals of propaganda-Detecting and estimating political influences in information spread in social networks.
Published 2025-01-01“…Social networks are a battlefield for political propaganda. Protected by the anonymity of the internet, political actors use computational propaganda to influence the masses. …”
Get full text
Article -
79
An Exploratory Investigation of Chatbot Applications in Anxiety Management: A Focus on Personalized Interventions
Published 2024-12-01“…The advantages include increased accessibility without geographical or temporal limitations, reduced costs, and an anonymity that encourages openness and reduces stigma. …”
Get full text
Article -
80
Ensuring Security for the Participants of Criminal Proceedings: Forensic Aspects
Published 2020-12-01“…The few works of criminalists mainly reflect the problems of anonymity of interrogating the witnesses, recommendations on tactical features of the interrogation and identification by the means of videoconference. …”
Get full text
Article