scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "ANONYMITY"

1 - 10 of 4,993 results for
 "ANONYMITY"
Results per page:

Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity.

Publication Type:Academic Journal

Source(s):Computational Intelligence & Neuroscience. 5/13/2022, p1-14. 14p.

Abstract:In cloud and edge computing, senders of data often want to be anonymous, while recipients of data always expect that the data come from a reliable sender and they are not redundant. Linkable ring signature (LRS) can not only protect the anonymity of th...

View details

A New Code-Based Traceable Ring Signature Scheme.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 4/29/2022, p1-10. 10p.

Abstract:Traceable ring signatures (TRS) can reveal the identity of the signer if he signs two different messages on the same tag in the group of users. They are widely used in e-voting and cryptocurrencies such as Monero. However, there is still no secure code...

View details

An Anonymous Verifiable Random Function with Applications in Blockchain.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 4/19/2022, p1-12. 12p.

Abstract:Verifiable random function is a powerful function that provides a noninteractively public verifiable proof for its output. Recently, verifiable random function has found essential applications in designing secure consensus protocols in blockchain. How ...

View details

A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare.

Publication Type:Academic Journal

Source(s):CMES-Computer Modeling in Engineering & Sciences. 2022, Vol. 131 Issue 1, p307-329. 23p.

Abstract:With the rise of the Internet of Things (IoT), the word "intelligent medical care" has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical inst...

View details

From Anonymity to Identity: Orality in Three Women Poets from North-East India.

Publication Type:Academic Journal

Source(s):Rupkatha Journal on Interdisciplinary Studies in Humanities. Mar-Jun2022, Vol. 14 Issue 2, p1-13. 13p.

Abstract:The expression ‘North-East India’ invokes an ethnographic monolith in popular imagination without looking into its multilingual set-up, heterogeneous cultural locations and diverse literary traditions, most of which are unscripted, orally composed and ...

View details

Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network.

Publication Type:Academic Journal

Source(s):Science, Technology & Human Values. Sep2022, Vol. 47 Issue 5, p910-936. 27p.

Abstract:This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of "privacy worlds" to explore the values and de...

View details

Affordances advancing user-created communication (UCC) in service: interactivity, visibility and anonymity.

Publication Type:Academic Journal

Source(s):Journal of Service Management. 2022, Vol. 33 Issue 4/5, p688-704. 17p.

Abstract:Purpose: Digital platform users not only consume but also produce communication related to their experiences. Although service research has explored users' motivations to communicate and focused on outcomes such as electronic word-of-mouth (eWOM), it r...

View details

Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 10/16/2021, p1-14. 14p.

Abstract:Outsourced attribute-based signatures (OABS) enable users to sign messages without revealing specific identity information and are suitable for scenarios with limited computing power. Recently, Mo et al. proposed an expressive outsourced attribute-base...

View details

GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 9/30/2021, p1-11. 11p.

Abstract:It is crucial to generate random graphs with specific structural properties from real graphs, which could anonymize graphs or generate targeted graph data sets. The state-of-the-art method called spectral graph forge (SGF) was proposed at INFOCOM 2018....

View details

The Identified Donor Effect: Disclosure of the Donor's Name Shapes the Recipient's Behavior.

Publication Type:Academic Journal

Source(s):Journal of Consumer Psychology (John Wiley & Sons, Inc. ). Apr2022, Vol. 32 Issue 2, p232-250. 19p.

Abstract:Previous research on charitable donations has examined the costs and benefits of anonymity from the perspectives of donors and charities. However, it is unclear how anonymity affects the recipients of a donation. This research examines how donor name d...

View details

banner_970x250 (970x250)

sponsored