Добірка наукової літератури з теми "Anonymous channel"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Anonymous channel".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Anonymous channel"

1

Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.

Повний текст джерела
Анотація:
This paper aims at examining the effect of wrongdoing reporting channels (anonymous and non-anonymous). Intention to report fraud via anonymous reporting channel are hypothesized to be higher than through non-anonymous reporting channel. As Hoftsede research of Indonesian culture, Indonesia has high score (78) on power distance dimention. This research uses experimental method to 152 students of Undergraduate of Accounting in UNP. By using eight-case scenarios, partispants were asked to answer the possibility to whistleblow the unethical behavior that occurred in the organization which was done by their manager or peer. The intention to report fraud via anonymous reporting channel is higher rather than via non-anonymous reporting channel. We also find that low power distance has positif impact for whistleblowing decision. Taken together, these findings contribute to the exising literature on accounting ethics.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Utami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.

Повний текст джерела
Анотація:
This study aims to determine the effect of financial rewards (given and not given), personal costs (low and high) and reporting channels (anonymous and non-anonymous) on whistleblowing intentions. This study also analyzes the interaction effects among financial reward and personal cost, financial reward and reporting channel as well as personal cost and reporting channel on whistleblowing intentions. Participants in this study involve 65 finance and accounting employees of state universities in Bali. This research employs a 2x2x2 experimental design. The results of this study indicate that whistleblowing intentions are greater when given financial rewards compared to not given financial rewards, in low personal cost compared with a high personal cost, reported through anonymous reporting channels than in non-anonymous reporting channels. The results of the interaction effect indicate that greater whistleblowing occurs when given a financial reward (case at a low personal cost), through non-anonymous reporting channels. The results also confirm that higher whistleblowing intentions appear in a low personal cost through anonym reporting channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Miceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.

Повний текст джерела
Анотація:
The “Deep Throat” case during Watergate — in which a well-placed unidentified source called attention to governmental wrongdoing — exemplifies the complexities created by anonymous whistle-blowing. What anonymous whistle-blowers may lose in credibility they gain in protection from reprisal. The trade-offs facing the potential whistle-blower who decides to remain unidentified are examined empirically using survey data from 8500 federal employees. Propositions derived from a model of bystander intervention (Latané & Darley, 1970) are investigated, with consideration of three decision points: whether the observer of organizational wrongdoing should blow the whistle, whether the whistle-blower should act anonymously, and whether the whistle-blower should report the wrong-doing through internal channels or to someone outside the organization. The results suggest a compounding of the last two decisions: in fact, the choice of channels represents one of four distinct strategies. Whistle-blowers may be anonymous or identified with either external or internal channels, but the conditions under which they do so vary dramatically. The whistle-blower who, like “Deep Throat,” chooses to use an anonymous external channel faces a series of interrelated and complex decisions.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Triantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Juang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.

Повний текст джерела
Анотація:
Latar Belakang:Saat ini telah banyak terjadi kecurangan seperti korupsi, pemalsuan laporan keuangan, suap menyuap, dan lain sebagainya. Adanya kasus kecurangan ini menimbulkan banyak kerugian. Oleh sebab itu maka dibutuhkan suatu kebijakan untuk mencegah maupun mengungkap adanya kecurangan salah satunya yaitu dengan menerapkan kebijakan whistleblowing. Kebijakan whistleblowing sudah diterapkan di berbagai perusahaan seperti perusahaan Telkom, Pertamina, Astra Group, Direktorat Jenderal Pajak, dan lain-lain. Namun untuk melakukan whistleblowing seseorang akan dipengaruhi oleh berbagai faktor seperti tingkat keseriusan pelanggaran, reporting channel, dan retaliasi.Tujuan:Penelitian ini bertujuan untuk menganalisis pengaruh tingkat keseriusan pelanggaran (rendah dan tinggi), reporting channels (anonymous reporting channel dan non-anonymous reporting channel), dan retaliasi (rendah dan tinggi) terhadap niat melakukan whistleblowing.Metode Penelitian:Pendekatan pada penelitian ini menggunakan eksperimen 2x2x2 between subjects effects dengan 165 subjek penelitian. Subjek dalam penelitian ini adalah mahasiswa S1 Program Studi Akuntansi Universitas Muhammadiyah Yogyakarta. Sampel dalam penelitian ini dipilih menggunakan metode purposive sampling. Alat analisis yang digunakan adalah Analysis of Variance (ANOVA).Hasil Penelitian:Hasil penelitian menunjukkan bahwa tingkat keseriusan pelanggaran tidak berpengaruh positif signifikan terhadap niat melakukan whistleblowing, adanya anonymous reporting channel lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing, dan retaliasi rendah lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing. Dalam kondisi tingkat keseriusan pelanggaran tinggi, anonymous reporting channel, dan retaliasi rendah lebih efektif dalam meningkatkan niat seseorang untuk melaporkan tindakan pelanggaran.Keterbatasan Penelitian:Responden pada penelitian hanya terbatas mahasiswa akuntansi FEB UMY angkatan 2018 di mana mahasiswa belum memahami kondisi sesungguhnya yang terjadi dalam dunia kerja.Keaslian/Novetly Penelitian:Penelitian ini merupakan replikasi dari penelitian terdahulu dengan mengganti variabel financial reward dengan tingkat keseriusan pelanggaran dan mengubah subyek serta lokasi penelitian.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Aldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.

Повний текст джерела
Анотація:
In this paper, a system of anonymous processes is considered that communicates with beeps through multiple channels in a synchronous communication model. In beeping channels, processes are limited to hearing either a beep or a silence from the channel with no collision detection. A strong model is assumed in which a process can beep on any single channel and listen on any specific channel during a single round. The goal is to develop distributed naming algorithms for two models where the number of processes is either known or unknown. A Las Vegas algorithm was developed for naming anonymous processes when the number of processes is known. This algorithm has an optimal time complexity of O(nlogn) rounds and uses O(nlogn) random bits, where n is the number of processes for the largest group. For the model with an unknown number of processes, a Monte Carlo algorithm was developed, which has an optimal running time of O(nlogn) rounds and a probability of success that is at least 1−12Ω(logn). The algorithms solve the naming problem in new models where processes communicate through multiple channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Banerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ciobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Anonymous channel"

1

Garcia, Eugene Lemuel R. "Bitcoin Transaction Tracing and Purchasing Behavior Characterization of Online Anonymous Marketplaces Using Side Channels." Research Showcase @ CMU, 2017. http://repository.cmu.edu/theses/128.

Повний текст джерела
Анотація:
We investigate to which degree one could trace Bitcoin transactions and characterize purchasing behavior of online anonymous marketplaces by exploiting side channels. Using a list of addresses found by the FBI on Silk Road servers, and information on the marketplace's official guides, we infer the role played by each address in the list and classify them based on heuristics. We then attempt to trace Bitcoin transactions and show that the anonymity set size is greatly reduced using product review data and the address classification performed on the previous step. Finally, using clustering techniques based on transaction graph analysis, we assign addresses into user wallets, then group these wallets together based on spending patterns, to be able to characterize purchasing behavior.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Li, Song. "Covert channels and anonymous communication in ad hoc networks." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7418.

Повний текст джерела
Анотація:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Хома, Любава Віталіївна. "Дослiдження криптографiчних протоколiв електронного голосування". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44250.

Повний текст джерела
Анотація:
Робота обсягом 45 сторiнок мiстить 4 рисунки, 12 таблиць та 15 лiтературних посилань. Метою роботи є огляд iснуючих систем електронного голосування, а також порiвняння їх можливостей та критерiїв, яким вiдповiдає повнiстю, яким частково. Вибiр системи електронного голосування, для якої планується виконати модифiкацiю. Об’єктом дослiдження в данiй роботi є системи електронного голосування i криптографiчний протоколи електронного голосування. Предметом дослiдження є математичнi моделi i характеристики алгоритмiв протоколiв електронного голосування. Виконано огляд до рiзних систем електронного голосування. Базуючись на результатах проведеного порiвняльного аналiзу наявних схем електронного голосування, у роботi запропоновано модифiкацiю, яка спрощує систему електронних виборiв з точки зору швидкодiї та обсягу необхiдної пам’ятi, для малоресурсної обчислювальної технiки.
This work consists of 45 pages, includes 4 illustrations, 9 tables and 10 literature references. The aim of this qualification work is to review existing e-voting systems, to compare their capabilities and criteria, which meet in full, in part. Select the electronic voting system for which the modification will be proposed. The object of the work is electronic voting systems and cryptographic protocols of e-voting. The subject of the work is mathematical models and algorithms of evoting protocols. A review of various electronic voting systems has been performed. Based on the results of a comparative analysis of existing electronic voting schemes, modification that simplifies the system of electronic elections in terms of speed and amount of memory required. For the possibility of using low-power equipment.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lee, Jing-Feng, and 李景逢. "A wireless-based authentication and anonymous channels for GSM system." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/23888697503819776777.

Повний текст джерела
Анотація:
碩士
淡江大學
資訊工程學系
90
For mobile roaming environment, the mobile uses visiting network’s services, the mobile station and the visiting network must authenticate each other. We propose a new authentication and anonymous channels protocol for roaming mobile. Our scheme can secure applied to GSM and CDPD wireless communication system, it not only supporting the mobile anonymity but also resolving the charging problem. The mobile station only takes 1Tmul + 1Tadd computation time in roaming mobile roaming environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ilivitsky, Susan. "Making sense of sudden personal transformation: a qualitative study on people’s beliefs about the facilitative factors and mechanisms of their abrupt and profound inner change." Thesis, 2011. http://hdl.handle.net/1828/3383.

Повний текст джерела
Анотація:
Sudden personal transformation (SPT) was defined as a subjectively reported, positive, profound, and lasting personal change that follows a relatively brief and memorable inner experience. Although such change has been described in numerous biographies, works of fiction, and religious and scholarly texts, a consistent definition and systematic program of research is lacking in the psychological literature. Moreover, almost nothing is known about what causes such change from the subjective point of view of individuals who have experienced it first hand. This study used semi-structured interviews and thematic analysis to explore the common beliefs of three participants about the factors that facilitated and the mechanisms that caused their SPT. Findings reveal that all participants reported a life transition, feeling miserable, feeling exhausted, feeling unable to resolve adverse circumstances, reaching a breaking point, and support from others facilitated their individual SPT’s. All participants also indicated that a formalized activity or ceremony as well as a process outside of their conscious control (either a higher power or a deep inner wisdom) produced or caused their SPT’s. Implications for future research and counselling practice are discussed.
Graduate
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Anonymous channel"

1

Changed lives: The story of Alcoholics Anonymous. Minneapolis: Augsburg, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Nicolas, Danet, ed. Anonymous: Pirates informatiques ou altermondialistes numériques? : peuvent-ils changer le monde? [Limoges]: FYP éditions, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Room, Adrian. A dictionary of pseudonyms and their origins, with stories of name changes. Jefferson, N.C: McFarland, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

A dictionary of pseudonyms and their origins, with stories of name changes. Chicago: St James Press, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jurczyszyn, Lukasz, Jacek Koltan, Pawel Kuczynski, and Mikolaj Rakusa-Suszczewski, eds. Obywatele ACTA. Gdansk, Poland: European Solidarity Centre, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Beuningen, Cor, and Kees Buitendijk, eds. Finance and the Common Good. NL Amsterdam: Amsterdam University Press, 2019. http://dx.doi.org/10.5117/9789463727914.

Повний текст джерела
Анотація:
Over the past fifty years, (financial) capitalism has brought about an enormous growth in wealth. Millions around the world have been lifted out of poverty. However, the downsides of the present global economic constitution are rapidly becoming evident as well. Rising inequality, soaring debt levels, and repeated cycles of boom and bust have proven to be some of its key characteristics. After the 2008 crisis brought the financial system to the brink of collapse, new regulations, stricter supervision, higher capital requirements, and ethical codes were introduced to the sector. Today we find ourselves in the middle of another economic boom. Yet one pressing question remains: has anything changed? Have the (necessary) repairs fixed the flaws in the system? Or do we require even more fundamental reforms? This volume builds on the observation that society has co-evolved with the financial sector. We cannot simply claim that 'finance' was the sole instigator of the 2008 crisis. Society itself has become financialized; the process of replacing relations, structures of trust and reciprocity, by anonymous and systemic transactions. The volume poses vital questions with regard to this societal development. How did this happen? And more importantly: is change possible? If yes, how? This volume contains 21 essays on the themes mentioned above. Authors include Jan Peter Balkenende, Wouter Bos, Lans Bovenberg, Govert Buijs, and Herman Van Rompuy. A recommendation by Dutch Minister of Finance Wopke Hoekstra is also included.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Morreim, Dennis C. Changed Lives: The Story of Alcoholics Anonymous. Augsburg Fortress Pub, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Groom, Nick. Draining the Irish Sea. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795155.003.0002.

Повний текст джерела
Анотація:
In 1722, an anonymous author published Thoughts of a Project for Draining the Irish Channel. This neglected work is a satire on both the South Sea Bubble and Anglo-Irish politics, capitalizing on the craze for speculation, scientific advances in hydraulics, resource management, political arithmetic, and improvement. This chapter accordingly argues that land reclamation was an effective metaphor for Anglo-Irish policy and British imperialism, which in turn raised questions of national identity, regional connectivity, and environmental management. It introduces new evidence to historicize coastal work by blending textual criticism, political and legal analysis, regional folklore studies, and counterfactual history. The chapter provides a history of the Irish Sea and an account of maritime trade and property rights, as well as an analysis of the pamphlet itself (including its connections to the work of Jonathan Swift). It ends with a thought experiment imagining the impact had the channel actually been drained.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Duval-Hernández, Robert, Gary S. Fields, and George H. Jakubson. Analysing income distribution changes: Anonymous versus panel income approaches. UNU-WIDER, 2015. http://dx.doi.org/10.35188/unu-wider/2015/911-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Richards, Emilie. Somewhere Between Luck and Trust (Goddesses Anonymous). MIRA, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Anonymous channel"

1

Ogata, Wakaha, Kaoru Kurosawa, Kazue Sako, and Kazunori Takatani. "Fault tolerant anonymous channel." In Information and Communications Security, 440–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028500.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pfitzmann, Birgit. "Breaking an efficient anonymous channel." In Advances in Cryptology — EUROCRYPT'94, 332–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tóth, Gergely, and Zoltán Hornák. "The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication." In Security and Privacy in Dynamic Environments, 483–92. Boston, MA: Springer US, 2006. http://dx.doi.org/10.1007/0-387-33406-8_45.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tian, Yangguang, Yingjiu Li, Binanda Sengupta, Nan Li, and Yong Yu. "Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion." In Cryptology and Network Security, 512–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Tripathy, Somanath, and Susil Kumar Mohanty. "MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network." In Financial Cryptography and Data Security, 481–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Konorski, Jerzy. "Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations." In Distributed Computing – IWDC 2005, 262–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11603771_29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Danezis, George, and Emilia Käsper. "The Dangers of Composing Anonymous Channels." In Information Hiding, 191–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36373-3_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Das, Anupam, and Nikita Borisov. "Securing Anonymous Communication Channels under the Selective DoS Attack." In Financial Cryptography and Data Security, 362–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cotticelli, Francesco. "Burladores e Convitati a Napoli tra Sei e Settecento, da Perrucci ad Abri (e oltre)." In Studi e saggi, 219–35. Florence: Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-150-1.14.

Повний текст джерела
Анотація:
This essay provides a comparison of select testimonies of the enduring tradition of Convitato di pietra (The Stone Guest) in Central and Southern Italy from the late 17th to the early 19th century. The text by Perrucci, the scenario from the Casamarciano collection, the anonymous revision located in the Italian Castle Archive at the Beinecke Library at Yale, and Abri’s opera tragica (which relies significantly on Perrucci’s setting) testify to the longevity of this plot – as well as of the Spanish repertoire – on the stage, in spite of notable changes, which reveal dramatic transformations in taste and sensitivity on the part of theatre practitioners and the audience.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Koenig, Reto E., Lukas Laederach, and Cédric von Allmen. "How to Authenticate MQTT Sessions Without Channel and Broker Security." In Applied Approach to Privacy and Security for the Internet of Things, 129–38. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2444-2.ch006.

Повний текст джерела
Анотація:
This chapter describes a new but state-of-the-art approach to provide authenticity in MQTT sessions using the means of zero-knowledge proofs. This approach completely voids session hijacking for the MQTT protocol and provides authenticity. The presented approach does not require the broker to keep any secrets for session handling. The presented approach allows completely anonymous but authentic sessions; hence, the broker does not need any priory knowledge of the client party. As it is especially targeted for applications within the world of internet of things (IoT), the presented approach is designed to require only the minimum in extra power in terms of energy and space. The approach does not introduce any new concept, but simply combines a state of the art cryptographic Zero-Knowledge Proof of identity with the existing MQTT 5.0 specification. Thus, no protocol extension is required in order to provide the targeted security properties. The described approach is completely agnostic to the application layer at the client side and is only required during MQTT session establishment.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Anonymous channel"

1

Garay, Juan A., Clinton Givens, Rafail Ostrovsky, and Pavel Raykov. "Fast and unconditionally secure anonymous channel." In the 2014 ACM symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611462.2611494.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Emura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Building secure and anonymous communication channel." In SAC 2014: Symposium on Applied Computing. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2554850.2554879.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kosugi, Tomoaki, Tomoki Hayafuji, and Masahiro Mambo. "On the Traceability of the Accountable Anonymous Channel." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Su, Li, Muxiang Yang, Jun Li, and Guohua Cui. "Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments." In 2006 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2006. http://dx.doi.org/10.1109/wicom.2006.202.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Guan, Zhenyu, Lixin Zhang, Yingpeng Zhang, Dawei Li, Yu Sun, and Jian Cui. "Off-chain Anonymous Payment Channel Scheme based on Mimblewimble." In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, 2021. http://dx.doi.org/10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00198.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Triantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "Towards an anonymous incident communication channel for electric smart grids." In PCI '18: 22nd Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3291533.3291559.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tairi, Erkan, Pedro Moreno-Sanchez, and Matteo Maffei. "A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs." In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. http://dx.doi.org/10.1109/sp40001.2021.00111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Braeken, An, and Abdellah Touhafi. "Efficient anonymous user authentication on server without secure channel during registration." In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). IEEE, 2016. http://dx.doi.org/10.1109/cloudtech.2016.7847702.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhou, Xuanwu, Xiaoyuan Yang, Ping Wei, and Yupu Hu. "An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem." In 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design. IEEE, 2006. http://dx.doi.org/10.1109/caidcd.2006.329336.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wang, Z., J. Deng, and R. B. Lee. "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.315.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Anonymous channel"

1

Moskowitz, Ira S., Richard E. Newman, and Paul F. Syverson. Quasi-Anonymous Channels. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada465128.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Brown, Candace, Chudney Williams, Ryan Stephens, Jacqueline Sharp, Bobby Bellflower, and Martinus Zeeman. Medicated-Assisted Treatment and 12-Step Programs: Evaluating the Referral Process. University of Tennessee Health Science Center, November 2021. http://dx.doi.org/10.21007/con.dnp.2021.0013.

Повний текст джерела
Анотація:
Purpose/Background Overdose deaths in the U.S. from opioids have dramatically increased since the COVID-19 pandemic. Although medicated-assisted treatment (MAT) programs are widely available for sufferers of opiate addiction, many drop out of treatment prematurely. Twelve-step programs are considered a valuable part of treatment, but few studies have examined the effect of combining these approaches. We aimed to compare abstinence rates among patients receiving MAT who were referred to 12-step programs to those only receiving MAT. Methods In this prospective study, a cohort of participants from a MAT clinic agreeing to attend a 12-step program was compared to 15 controls selected from a database before project implementation. Eligible participants were diagnosed with OUD, receiving buprenorphine (opiate agonist), and at least 18. Participants were provided with temporary sponsors to attend Narcotics Anonymous, Alcoholics Anonymous, and Medication-Assisted Recovery meetings together. The primary endpoint was the change in positive opiate urine drug screens over 6 months between participants and controls. Results Between March 29, 2021, and April 16, 2021, 166 patients were scheduled at the clinic. Of those scheduled, 146 were established patients, and 123 were scheduled for face-to-face visits. Of these, 64 appeared for the appointment, 6 were screened, and 3 were enrolled. None of the participants attended a 12-step meeting. Enrollment barriers included excluding new patients and those attending virtual visits, the high percentage of patients who missed appointments, and lack of staff referrals. The low incidence of referrals was due to time constraints by both staff and patients. Implications for Nursing Practice Low enrollment limited our ability to determine whether combining medication management with a 12-step program improves abstinence. Failure to keep appointments is common among patients with OUD, and virtual meetings are becoming more prevalent post-COVID. Although these factors are unlikely to be controllable, developing strategies to expedite the enrollment process for staff and patients could hasten recruitment.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії