UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 5.252
11.
  • Tor, what is it good for? P... Tor, what is it good for? Political repression and the use of online anonymity-granting technologies
    Jardine, Eric New media & society, 02/2018, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano

    Why do people use anonymity-granting technologies when surfing the Internet? Anecdotal evidence suggests that people often resort to using online anonymity services, like the Tor network, because ...
Celotno besedilo
12.
  • A survey on privacy protect... A survey on privacy protection in blockchain system
    Feng, Qi; He, Debiao; Zeadally, Sherali ... Journal of network and computer applications, 01/2019, Letnik: 126
    Journal Article
    Recenzirano

    Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received considerable attention recently. It applies a linked block structure to verify and store ...
Celotno besedilo
13.
  • MorphIT: Morphing Packet Re... MorphIT: Morphing Packet Reports for Internet Transparency
    Fragkouli, Georgia; Argyraki, Katerina; Ford, Bryan Proceedings on Privacy Enhancing Technologies, 04/2019, Letnik: 2019, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Can we improve Internet transparency without worsening user anonymity? For a long time, researchers have been proposing transparency systems, where traffic reports produced at strategic network ...
Celotno besedilo

PDF
14.
  • Achieving Personalized k-An... Achieving Personalized k-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS
    Wang, Jinbao; Cai, Zhipeng; Yu, Jiguo IEEE transactions on industrial informatics, 2020-June, 2020-6-00, Letnik: 16, Številka: 6
    Journal Article
    Odprti dostop

    Enabled by the industrial Internet, intelligent transportation has made remarkable achievements such as autonomous vehicles by carnegie mellon university (CMU) Navlab, Google Cars, Tesla, etc. ...
Celotno besedilo
15.
  • AttriChain: Decentralized t... AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain
    Shao, Wei; Jia, Chunfu; Xu, Yunkai ... Computers & security, December 2020, 2020-12-00, Letnik: 99
    Journal Article
    Recenzirano

    •We propose AttriChain, a framework that allows users to interact with the network using anonymous and traceable identities in a permissioned blockchain.•We define the functionality of AttriChain in ...
Celotno besedilo
16.
  • Conditional anonymity with ... Conditional anonymity with non-probabilistic adversary
    Chen, Weien; Cao, Yongzhi; Wang, Hanpin Information sciences, 12/2015, Letnik: 324
    Journal Article
    Recenzirano

    •We propose a new notion of anonymity, called set-theoretic conditional anonymity.•We compare the hierarchy of strong anonymity and the hierarchy of conditional anonymity.•We define a metric for ...
Celotno besedilo
17.
  • Unpacking (the) secret: Ano... Unpacking (the) secret: Anonymous social media and the impossibility of networked anonymity
    Sharon, Tzlil; John, Nicholas A New media & society, 11/2018, Letnik: 20, Številka: 11
    Journal Article
    Recenzirano

    This study focuses on the perceptions and practices of anonymous communication with friends enabled by tie-based anonymous apps. Based on qualitative analysis of in-depth interviews with users of the ...
Celotno besedilo
18.
Celotno besedilo
19.
  • Graphic sequences, distance... Graphic sequences, distances and k-degree anonymity
    Salas, Julián; Torra, Vicenç Discrete Applied Mathematics, 06/2015, Letnik: 188, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper we study conditions to approximate a given graph by a regular one. We obtain optimal conditions for a few metrics such as the edge rotation distance for graphs, the rectilinear and the ...
Celotno besedilo

PDF
20.
  • Privacy Preserving Location... Privacy Preserving Location Data Publishing: A Machine Learning Approach
    Shaham, Sina; Ding, Ming; Liu, Bo ... IEEE transactions on knowledge and data engineering, 2021-Sept.-1, 2021-9-1, Letnik: 33, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Publishing datasets plays an essential role in open data research and promoting transparency of government agencies. However, such data publication might reveal users' private information. One of the ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 5.252

Nalaganje filtrov