Academic literature on the topic 'Anonymous channel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anonymous channel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Anonymous channel"

1

Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.

Full text
Abstract:
This paper aims at examining the effect of wrongdoing reporting channels (anonymous and non-anonymous). Intention to report fraud via anonymous reporting channel are hypothesized to be higher than through non-anonymous reporting channel. As Hoftsede research of Indonesian culture, Indonesia has high score (78) on power distance dimention. This research uses experimental method to 152 students of Undergraduate of Accounting in UNP. By using eight-case scenarios, partispants were asked to answer the possibility to whistleblow the unethical behavior that occurred in the organization which was done by their manager or peer. The intention to report fraud via anonymous reporting channel is higher rather than via non-anonymous reporting channel. We also find that low power distance has positif impact for whistleblowing decision. Taken together, these findings contribute to the exising literature on accounting ethics.
APA, Harvard, Vancouver, ISO, and other styles
2

Utami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.

Full text
Abstract:
This study aims to determine the effect of financial rewards (given and not given), personal costs (low and high) and reporting channels (anonymous and non-anonymous) on whistleblowing intentions. This study also analyzes the interaction effects among financial reward and personal cost, financial reward and reporting channel as well as personal cost and reporting channel on whistleblowing intentions. Participants in this study involve 65 finance and accounting employees of state universities in Bali. This research employs a 2x2x2 experimental design. The results of this study indicate that whistleblowing intentions are greater when given financial rewards compared to not given financial rewards, in low personal cost compared with a high personal cost, reported through anonymous reporting channels than in non-anonymous reporting channels. The results of the interaction effect indicate that greater whistleblowing occurs when given a financial reward (case at a low personal cost), through non-anonymous reporting channels. The results also confirm that higher whistleblowing intentions appear in a low personal cost through anonym reporting channels.
APA, Harvard, Vancouver, ISO, and other styles
3

Miceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.

Full text
Abstract:
The “Deep Throat” case during Watergate — in which a well-placed unidentified source called attention to governmental wrongdoing — exemplifies the complexities created by anonymous whistle-blowing. What anonymous whistle-blowers may lose in credibility they gain in protection from reprisal. The trade-offs facing the potential whistle-blower who decides to remain unidentified are examined empirically using survey data from 8500 federal employees. Propositions derived from a model of bystander intervention (Latané & Darley, 1970) are investigated, with consideration of three decision points: whether the observer of organizational wrongdoing should blow the whistle, whether the whistle-blower should act anonymously, and whether the whistle-blower should report the wrong-doing through internal channels or to someone outside the organization. The results suggest a compounding of the last two decisions: in fact, the choice of channels represents one of four distinct strategies. Whistle-blowers may be anonymous or identified with either external or internal channels, but the conditions under which they do so vary dramatically. The whistle-blower who, like “Deep Throat,” chooses to use an anonymous external channel faces a series of interrelated and complex decisions.
APA, Harvard, Vancouver, ISO, and other styles
4

Triantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Juang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.

Full text
Abstract:
Latar Belakang:Saat ini telah banyak terjadi kecurangan seperti korupsi, pemalsuan laporan keuangan, suap menyuap, dan lain sebagainya. Adanya kasus kecurangan ini menimbulkan banyak kerugian. Oleh sebab itu maka dibutuhkan suatu kebijakan untuk mencegah maupun mengungkap adanya kecurangan salah satunya yaitu dengan menerapkan kebijakan whistleblowing. Kebijakan whistleblowing sudah diterapkan di berbagai perusahaan seperti perusahaan Telkom, Pertamina, Astra Group, Direktorat Jenderal Pajak, dan lain-lain. Namun untuk melakukan whistleblowing seseorang akan dipengaruhi oleh berbagai faktor seperti tingkat keseriusan pelanggaran, reporting channel, dan retaliasi.Tujuan:Penelitian ini bertujuan untuk menganalisis pengaruh tingkat keseriusan pelanggaran (rendah dan tinggi), reporting channels (anonymous reporting channel dan non-anonymous reporting channel), dan retaliasi (rendah dan tinggi) terhadap niat melakukan whistleblowing.Metode Penelitian:Pendekatan pada penelitian ini menggunakan eksperimen 2x2x2 between subjects effects dengan 165 subjek penelitian. Subjek dalam penelitian ini adalah mahasiswa S1 Program Studi Akuntansi Universitas Muhammadiyah Yogyakarta. Sampel dalam penelitian ini dipilih menggunakan metode purposive sampling. Alat analisis yang digunakan adalah Analysis of Variance (ANOVA).Hasil Penelitian:Hasil penelitian menunjukkan bahwa tingkat keseriusan pelanggaran tidak berpengaruh positif signifikan terhadap niat melakukan whistleblowing, adanya anonymous reporting channel lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing, dan retaliasi rendah lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing. Dalam kondisi tingkat keseriusan pelanggaran tinggi, anonymous reporting channel, dan retaliasi rendah lebih efektif dalam meningkatkan niat seseorang untuk melaporkan tindakan pelanggaran.Keterbatasan Penelitian:Responden pada penelitian hanya terbatas mahasiswa akuntansi FEB UMY angkatan 2018 di mana mahasiswa belum memahami kondisi sesungguhnya yang terjadi dalam dunia kerja.Keaslian/Novetly Penelitian:Penelitian ini merupakan replikasi dari penelitian terdahulu dengan mengganti variabel financial reward dengan tingkat keseriusan pelanggaran dan mengubah subyek serta lokasi penelitian.
APA, Harvard, Vancouver, ISO, and other styles
7

Aldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.

Full text
Abstract:
In this paper, a system of anonymous processes is considered that communicates with beeps through multiple channels in a synchronous communication model. In beeping channels, processes are limited to hearing either a beep or a silence from the channel with no collision detection. A strong model is assumed in which a process can beep on any single channel and listen on any specific channel during a single round. The goal is to develop distributed naming algorithms for two models where the number of processes is either known or unknown. A Las Vegas algorithm was developed for naming anonymous processes when the number of processes is known. This algorithm has an optimal time complexity of O(nlogn) rounds and uses O(nlogn) random bits, where n is the number of processes for the largest group. For the model with an unknown number of processes, a Monte Carlo algorithm was developed, which has an optimal running time of O(nlogn) rounds and a probability of success that is at least 1−12Ω(logn). The algorithms solve the naming problem in new models where processes communicate through multiple channels.
APA, Harvard, Vancouver, ISO, and other styles
8

Hwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Banerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ciobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Anonymous channel"

1

Garcia, Eugene Lemuel R. "Bitcoin Transaction Tracing and Purchasing Behavior Characterization of Online Anonymous Marketplaces Using Side Channels." Research Showcase @ CMU, 2017. http://repository.cmu.edu/theses/128.

Full text
Abstract:
We investigate to which degree one could trace Bitcoin transactions and characterize purchasing behavior of online anonymous marketplaces by exploiting side channels. Using a list of addresses found by the FBI on Silk Road servers, and information on the marketplace's official guides, we infer the role played by each address in the list and classify them based on heuristics. We then attempt to trace Bitcoin transactions and show that the anonymity set size is greatly reduced using product review data and the address classification performed on the previous step. Finally, using clustering techniques based on transaction graph analysis, we assign addresses into user wallets, then group these wallets together based on spending patterns, to be able to characterize purchasing behavior.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Song. "Covert channels and anonymous communication in ad hoc networks." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7418.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
3

Хома, Любава Віталіївна. "Дослiдження криптографiчних протоколiв електронного голосування." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44250.

Full text
Abstract:
Робота обсягом 45 сторiнок мiстить 4 рисунки, 12 таблиць та 15 лiтературних посилань. Метою роботи є огляд iснуючих систем електронного голосування, а також порiвняння їх можливостей та критерiїв, яким вiдповiдає повнiстю, яким частково. Вибiр системи електронного голосування, для якої планується виконати модифiкацiю. Об’єктом дослiдження в данiй роботi є системи електронного голосування i криптографiчний протоколи електронного голосування. Предметом дослiдження є математичнi моделi i характеристики алгоритмiв протоколiв електронного голосування. Виконано огляд до рiзних систем електронного голосування. Базуючись на результатах проведеного порiвняльного аналiзу наявних схем електронного голосування, у роботi запропоновано модифiкацiю, яка спрощує систему електронних виборiв з точки зору швидкодiї та обсягу необхiдної пам’ятi, для малоресурсної обчислювальної технiки.
This work consists of 45 pages, includes 4 illustrations, 9 tables and 10 literature references. The aim of this qualification work is to review existing e-voting systems, to compare their capabilities and criteria, which meet in full, in part. Select the electronic voting system for which the modification will be proposed. The object of the work is electronic voting systems and cryptographic protocols of e-voting. The subject of the work is mathematical models and algorithms of evoting protocols. A review of various electronic voting systems has been performed. Based on the results of a comparative analysis of existing electronic voting schemes, modification that simplifies the system of electronic elections in terms of speed and amount of memory required. For the possibility of using low-power equipment.
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Jing-Feng, and 李景逢. "A wireless-based authentication and anonymous channels for GSM system." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/23888697503819776777.

Full text
Abstract:
碩士
淡江大學
資訊工程學系
90
For mobile roaming environment, the mobile uses visiting network’s services, the mobile station and the visiting network must authenticate each other. We propose a new authentication and anonymous channels protocol for roaming mobile. Our scheme can secure applied to GSM and CDPD wireless communication system, it not only supporting the mobile anonymity but also resolving the charging problem. The mobile station only takes 1Tmul + 1Tadd computation time in roaming mobile roaming environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Ilivitsky, Susan. "Making sense of sudden personal transformation: a qualitative study on people’s beliefs about the facilitative factors and mechanisms of their abrupt and profound inner change." Thesis, 2011. http://hdl.handle.net/1828/3383.

Full text
Abstract:
Sudden personal transformation (SPT) was defined as a subjectively reported, positive, profound, and lasting personal change that follows a relatively brief and memorable inner experience. Although such change has been described in numerous biographies, works of fiction, and religious and scholarly texts, a consistent definition and systematic program of research is lacking in the psychological literature. Moreover, almost nothing is known about what causes such change from the subjective point of view of individuals who have experienced it first hand. This study used semi-structured interviews and thematic analysis to explore the common beliefs of three participants about the factors that facilitated and the mechanisms that caused their SPT. Findings reveal that all participants reported a life transition, feeling miserable, feeling exhausted, feeling unable to resolve adverse circumstances, reaching a breaking point, and support from others facilitated their individual SPT’s. All participants also indicated that a formalized activity or ceremony as well as a process outside of their conscious control (either a higher power or a deep inner wisdom) produced or caused their SPT’s. Implications for future research and counselling practice are discussed.
Graduate
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Anonymous channel"

1

Changed lives: The story of Alcoholics Anonymous. Minneapolis: Augsburg, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nicolas, Danet, ed. Anonymous: Pirates informatiques ou altermondialistes numériques? : peuvent-ils changer le monde? [Limoges]: FYP éditions, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Room, Adrian. A dictionary of pseudonyms and their origins, with stories of name changes. Jefferson, N.C: McFarland, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

A dictionary of pseudonyms and their origins, with stories of name changes. Chicago: St James Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jurczyszyn, Lukasz, Jacek Koltan, Pawel Kuczynski, and Mikolaj Rakusa-Suszczewski, eds. Obywatele ACTA. Gdansk, Poland: European Solidarity Centre, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beuningen, Cor, and Kees Buitendijk, eds. Finance and the Common Good. NL Amsterdam: Amsterdam University Press, 2019. http://dx.doi.org/10.5117/9789463727914.

Full text
Abstract:
Over the past fifty years, (financial) capitalism has brought about an enormous growth in wealth. Millions around the world have been lifted out of poverty. However, the downsides of the present global economic constitution are rapidly becoming evident as well. Rising inequality, soaring debt levels, and repeated cycles of boom and bust have proven to be some of its key characteristics. After the 2008 crisis brought the financial system to the brink of collapse, new regulations, stricter supervision, higher capital requirements, and ethical codes were introduced to the sector. Today we find ourselves in the middle of another economic boom. Yet one pressing question remains: has anything changed? Have the (necessary) repairs fixed the flaws in the system? Or do we require even more fundamental reforms? This volume builds on the observation that society has co-evolved with the financial sector. We cannot simply claim that 'finance' was the sole instigator of the 2008 crisis. Society itself has become financialized; the process of replacing relations, structures of trust and reciprocity, by anonymous and systemic transactions. The volume poses vital questions with regard to this societal development. How did this happen? And more importantly: is change possible? If yes, how? This volume contains 21 essays on the themes mentioned above. Authors include Jan Peter Balkenende, Wouter Bos, Lans Bovenberg, Govert Buijs, and Herman Van Rompuy. A recommendation by Dutch Minister of Finance Wopke Hoekstra is also included.
APA, Harvard, Vancouver, ISO, and other styles
7

Morreim, Dennis C. Changed Lives: The Story of Alcoholics Anonymous. Augsburg Fortress Pub, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Groom, Nick. Draining the Irish Sea. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795155.003.0002.

Full text
Abstract:
In 1722, an anonymous author published Thoughts of a Project for Draining the Irish Channel. This neglected work is a satire on both the South Sea Bubble and Anglo-Irish politics, capitalizing on the craze for speculation, scientific advances in hydraulics, resource management, political arithmetic, and improvement. This chapter accordingly argues that land reclamation was an effective metaphor for Anglo-Irish policy and British imperialism, which in turn raised questions of national identity, regional connectivity, and environmental management. It introduces new evidence to historicize coastal work by blending textual criticism, political and legal analysis, regional folklore studies, and counterfactual history. The chapter provides a history of the Irish Sea and an account of maritime trade and property rights, as well as an analysis of the pamphlet itself (including its connections to the work of Jonathan Swift). It ends with a thought experiment imagining the impact had the channel actually been drained.
APA, Harvard, Vancouver, ISO, and other styles
9

Duval-Hernández, Robert, Gary S. Fields, and George H. Jakubson. Analysing income distribution changes: Anonymous versus panel income approaches. UNU-WIDER, 2015. http://dx.doi.org/10.35188/unu-wider/2015/911-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Richards, Emilie. Somewhere Between Luck and Trust (Goddesses Anonymous). MIRA, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Anonymous channel"

1

Ogata, Wakaha, Kaoru Kurosawa, Kazue Sako, and Kazunori Takatani. "Fault tolerant anonymous channel." In Information and Communications Security, 440–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pfitzmann, Birgit. "Breaking an efficient anonymous channel." In Advances in Cryptology — EUROCRYPT'94, 332–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tóth, Gergely, and Zoltán Hornák. "The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication." In Security and Privacy in Dynamic Environments, 483–92. Boston, MA: Springer US, 2006. http://dx.doi.org/10.1007/0-387-33406-8_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Yangguang, Yingjiu Li, Binanda Sengupta, Nan Li, and Yong Yu. "Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion." In Cryptology and Network Security, 512–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tripathy, Somanath, and Susil Kumar Mohanty. "MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network." In Financial Cryptography and Data Security, 481–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Konorski, Jerzy. "Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations." In Distributed Computing – IWDC 2005, 262–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11603771_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Danezis, George, and Emilia Käsper. "The Dangers of Composing Anonymous Channels." In Information Hiding, 191–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36373-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Das, Anupam, and Nikita Borisov. "Securing Anonymous Communication Channels under the Selective DoS Attack." In Financial Cryptography and Data Security, 362–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cotticelli, Francesco. "Burladores e Convitati a Napoli tra Sei e Settecento, da Perrucci ad Abri (e oltre)." In Studi e saggi, 219–35. Florence: Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-150-1.14.

Full text
Abstract:
This essay provides a comparison of select testimonies of the enduring tradition of Convitato di pietra (The Stone Guest) in Central and Southern Italy from the late 17th to the early 19th century. The text by Perrucci, the scenario from the Casamarciano collection, the anonymous revision located in the Italian Castle Archive at the Beinecke Library at Yale, and Abri’s opera tragica (which relies significantly on Perrucci’s setting) testify to the longevity of this plot – as well as of the Spanish repertoire – on the stage, in spite of notable changes, which reveal dramatic transformations in taste and sensitivity on the part of theatre practitioners and the audience.
APA, Harvard, Vancouver, ISO, and other styles
10

Koenig, Reto E., Lukas Laederach, and Cédric von Allmen. "How to Authenticate MQTT Sessions Without Channel and Broker Security." In Applied Approach to Privacy and Security for the Internet of Things, 129–38. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2444-2.ch006.

Full text
Abstract:
This chapter describes a new but state-of-the-art approach to provide authenticity in MQTT sessions using the means of zero-knowledge proofs. This approach completely voids session hijacking for the MQTT protocol and provides authenticity. The presented approach does not require the broker to keep any secrets for session handling. The presented approach allows completely anonymous but authentic sessions; hence, the broker does not need any priory knowledge of the client party. As it is especially targeted for applications within the world of internet of things (IoT), the presented approach is designed to require only the minimum in extra power in terms of energy and space. The approach does not introduce any new concept, but simply combines a state of the art cryptographic Zero-Knowledge Proof of identity with the existing MQTT 5.0 specification. Thus, no protocol extension is required in order to provide the targeted security properties. The described approach is completely agnostic to the application layer at the client side and is only required during MQTT session establishment.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Anonymous channel"

1

Garay, Juan A., Clinton Givens, Rafail Ostrovsky, and Pavel Raykov. "Fast and unconditionally secure anonymous channel." In the 2014 ACM symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611462.2611494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Emura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Building secure and anonymous communication channel." In SAC 2014: Symposium on Applied Computing. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2554850.2554879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kosugi, Tomoaki, Tomoki Hayafuji, and Masahiro Mambo. "On the Traceability of the Accountable Anonymous Channel." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Su, Li, Muxiang Yang, Jun Li, and Guohua Cui. "Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments." In 2006 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2006. http://dx.doi.org/10.1109/wicom.2006.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guan, Zhenyu, Lixin Zhang, Yingpeng Zhang, Dawei Li, Yu Sun, and Jian Cui. "Off-chain Anonymous Payment Channel Scheme based on Mimblewimble." In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, 2021. http://dx.doi.org/10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Triantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "Towards an anonymous incident communication channel for electric smart grids." In PCI '18: 22nd Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3291533.3291559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tairi, Erkan, Pedro Moreno-Sanchez, and Matteo Maffei. "A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs." In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. http://dx.doi.org/10.1109/sp40001.2021.00111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Braeken, An, and Abdellah Touhafi. "Efficient anonymous user authentication on server without secure channel during registration." In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). IEEE, 2016. http://dx.doi.org/10.1109/cloudtech.2016.7847702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Xuanwu, Xiaoyuan Yang, Ping Wei, and Yupu Hu. "An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem." In 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design. IEEE, 2006. http://dx.doi.org/10.1109/caidcd.2006.329336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Z., J. Deng, and R. B. Lee. "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.315.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Anonymous channel"

1

Moskowitz, Ira S., Richard E. Newman, and Paul F. Syverson. Quasi-Anonymous Channels. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada465128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brown, Candace, Chudney Williams, Ryan Stephens, Jacqueline Sharp, Bobby Bellflower, and Martinus Zeeman. Medicated-Assisted Treatment and 12-Step Programs: Evaluating the Referral Process. University of Tennessee Health Science Center, November 2021. http://dx.doi.org/10.21007/con.dnp.2021.0013.

Full text
Abstract:
Purpose/Background Overdose deaths in the U.S. from opioids have dramatically increased since the COVID-19 pandemic. Although medicated-assisted treatment (MAT) programs are widely available for sufferers of opiate addiction, many drop out of treatment prematurely. Twelve-step programs are considered a valuable part of treatment, but few studies have examined the effect of combining these approaches. We aimed to compare abstinence rates among patients receiving MAT who were referred to 12-step programs to those only receiving MAT. Methods In this prospective study, a cohort of participants from a MAT clinic agreeing to attend a 12-step program was compared to 15 controls selected from a database before project implementation. Eligible participants were diagnosed with OUD, receiving buprenorphine (opiate agonist), and at least 18. Participants were provided with temporary sponsors to attend Narcotics Anonymous, Alcoholics Anonymous, and Medication-Assisted Recovery meetings together. The primary endpoint was the change in positive opiate urine drug screens over 6 months between participants and controls. Results Between March 29, 2021, and April 16, 2021, 166 patients were scheduled at the clinic. Of those scheduled, 146 were established patients, and 123 were scheduled for face-to-face visits. Of these, 64 appeared for the appointment, 6 were screened, and 3 were enrolled. None of the participants attended a 12-step meeting. Enrollment barriers included excluding new patients and those attending virtual visits, the high percentage of patients who missed appointments, and lack of staff referrals. The low incidence of referrals was due to time constraints by both staff and patients. Implications for Nursing Practice Low enrollment limited our ability to determine whether combining medication management with a 12-step program improves abstinence. Failure to keep appointments is common among patients with OUD, and virtual meetings are becoming more prevalent post-COVID. Although these factors are unlikely to be controllable, developing strategies to expedite the enrollment process for staff and patients could hasten recruitment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography