Добірка наукової літератури з теми "User anonymity"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "User anonymity".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "User anonymity"
Peddinti, Sai Teja, Keith W. Ross, and Justin Cappos. "User Anonymity on Twitter." IEEE Security & Privacy 15, no. 3 (2017): 84–87. http://dx.doi.org/10.1109/msp.2017.74.
Повний текст джерелаLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Повний текст джерелаAn, Young Hwa. "Security Weaknesses and Improvements of a Remote User Authentication Scheme Preserving User Anonymity." Applied Mechanics and Materials 145 (December 2011): 184–88. http://dx.doi.org/10.4028/www.scientific.net/amm.145.184.
Повний текст джерелаChoi, Jong-Seok, and Seung-Soo Shin. "Traceable Authentication Scheme Providing User Anonymity." Journal of the Korea Contents Association 9, no. 4 (April 28, 2009): 95–102. http://dx.doi.org/10.5392/jkca.2009.9.4.095.
Повний текст джерелаKANG, Miyoung, Hyun Sook RHEE, and Jin-Young CHOI. "Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 2 (2011): 860–64. http://dx.doi.org/10.1587/transfun.e94.a.860.
Повний текст джерелаTseng, Huei-Ru, Rong-Hong Jan, and Wuu Yang. "A bilateral remote user authentication scheme that preserves user anonymity." Security and Communication Networks 1, no. 4 (July 2008): 301–8. http://dx.doi.org/10.1002/sec.26.
Повний текст джерелаWu, Shuhua, Yuefei Zhu, and Qiong Pu. "Robust smart-cards-based user authentication scheme with user anonymity." Security and Communication Networks 5, no. 2 (April 28, 2011): 236–48. http://dx.doi.org/10.1002/sec.315.
Повний текст джерелаDas, Debajyoti, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. "Comprehensive Anonymity Trilemma: User Coordination is not enough." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 356–83. http://dx.doi.org/10.2478/popets-2020-0056.
Повний текст джерелаShin, Kwang-Cheul. "A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity." Journal of Society for e-Business Studies 18, no. 2 (May 31, 2013): 81–93. http://dx.doi.org/10.7838/jsebs.2013.18.2.081.
Повний текст джерелаChandrakar, Preeti, and Hari Om. "RSA Based Two-factor Remote User Authentication Scheme with User Anonymity." Procedia Computer Science 70 (2015): 318–24. http://dx.doi.org/10.1016/j.procs.2015.10.023.
Повний текст джерелаДисертації з теми "User anonymity"
Pajunen, Mihkel. "An Evaluation of User Attitudes Towards Anonymity in Bitcoin." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-14120.
Повний текст джерелаBoldyreva, Alexandra. "Public-key encryption in the multi-user setting : privacy, anonymity and efficiency /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3137232.
Повний текст джерелаAbreu, Giovanna Oliveira Lima de. "A soberania dos dados versus a autonomia do usuário: Big Data, Internet das Coisas e as estratégias afirmativas do anonimato." Universidade Federal da Paraíba, 2015. http://tede.biblioteca.ufpb.br:8080/handle/tede/7897.
Повний текст джерелаMade available in DSpace on 2016-02-18T18:09:26Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5) Previous issue date: 2015-05-29
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The interaction between society and technology in the context of mediated ambience, enhanced by processes and tools such as Big Data and Internet of Things are the basis of scientific advances that are gradually transforming our daily lives. With the Big Data phenomenon we are able to capture a massive quantity of data, creating endless possibilities of connections and control. The Internet of Things, in turn, is related to embedded devices networks that communicate with each other in an automated way to help make our lives more efficient and more vulnerable too. In the era of pervasive computing and datafication, any attempt to safeguard our data seems insufficient. So, this study presents a reflection on the existing oppositeness between the ideas of freedom as an essential attribute for online information sharing and the sovereignty imposed by the data control, besides we also examine the implications of this surveillance on the user autonomy. To understand the links between the mediations, the network and the members of this interconnected system, we adopted the Actor-Network Theory (LATOUR, 2012). This theory of social also inserts itself as the methodology, laying the foundations for guiding this study. Another important point is to understand the conceptual differences between surveillance, control and monitoring (LEMOS, 2009). The work, divided into two parts and their respective chapters, also includes the analysis of some attempts of resistance to this control imposed on members of the interconnected public sphere, and it points out the paradoxes concerning, particularly, to anonymity, one of the main forms of opposition to the monitoring state established in the net. Since we are in the middle of a still in progress process, accurate and airtight conclusions are not possible. However, if we are not able to set limits to the new digital society, then we run a risk of seeing vital rights, essential to the proper functioning of society, wrecked in the name of innovation and convenience.
A interação entre sociedade e tecnologia presente no contexto da midiatização, potencializada por processos e ferramentas como o Big Data e a Internet das Coisas são a base de avanços científicos que vêm, paulatinamente, transformando o nosso cotidiano. Com o fenômeno do Big Data capta-se uma torrente de dados, gerando infinitas possibilidades de conexões e controle. A Internet das Coisas, por sua vez, está relacionada às redes de dispositivos embarcados que se comunicam uns com os outros de forma automatizada para ajudar a tornar nossas vidas mais eficientes, porém mais vulneráveis. Na era da computação pervasiva e da dataficação, qualquer tentativa de salvaguardar nossos dados parece insuficiente. Assim, este estudo traz uma reflexão sobre o oposicionismo entre as ideias de liberdade como atributo essencial para o compartilhamento de informações online e a soberania conquistada através do controle dos dados, além de examinar as implicações da vigilância sobre a autonomia do usuário. Para compreender os vínculos entre as mediações, a rede e os integrantes desse sistema interconectado, adotamos a Teoria Ator-Rede (LATOUR, 2012). Essa teoria do social insere-se também como metodologia, lançando os princípios norteadores para elaboração da pesquisa. Outro ponto relevante é a compreensão das diferenças conceituais entre as ações de vigilância, controle e monitoramento (LEMOS, 2009). O trabalho, dividido em duas partes e seus respectivos capítulos, conta ainda com a análise de algumas tentativas de resistência ao controle imposto aos integrantes da esfera pública interconectada, e com apontamentos às antinomias referentes, em específico, ao anonimato, uma das principais formas de oposição ao monitoramento instaurado na rede. Por estarmos diante de um processo em franco desenvolvimento, conclusões exatas e certeiras não são possíveis. Todavia, se não formos, desde já, capazes de estabelecer limites para essa nova sociedade digital, então correremos o risco de vermos naufragar direitos vitais para o bom funcionamento da sociedade em prol da inovação e da conveniência.
Hoang, Van-Hoan. "Securing data access and exchanges in a heterogeneous ecosystem : An adaptive and context-sensitive approach." Thesis, La Rochelle, 2022. http://www.theses.fr/2022LAROS009.
Повний текст джерелаCloud-based data storage and sharing services have been proven successful since the last decades. The underlying model helps users not to expensively spend on hardware to store data while still being able to access and share data anywhere and whenever they desire. In this context, security is vital to protecting users and their resources. Regarding users, they need to be securely authenticated to prove their eligibility to access resources. As for user privacy, showing credentials enables the service provider to detect sharing-related people or build a profile for each. Regarding outsourced data, due to complexity in deploying an effective key management in such services, data is often not encrypted by users but service providers. This enables them to read users’ data. In this thesis, we make a set of contributions which address these issues. First, we design a password-based authenticated key exchange protocol to establish a secure channel between users and service providers over insecure environment. Second, we construct a privacy-enhancing decentralized public key infrastructure which allows building secure authentication protocols while preserving user privacy. Third, we design two revocable ciphertext-policy attribute-based encryption schemes. These provide effective key management systems to help a data owner to encrypt data before outsourcing it while still retaining the capacity to securely share it with others. Fourth, we build a decentralized data sharing platform by leveraging the blockchain technology and the IPFS network. The platform aims at providing high data availability, data confidentiality, secure access control, and user privacy
Kaymaz, Feyyat [Verfasser]. "User-Anonymität in Mobile Payment Systemen. Ein Referenzmodell zur Gestaltung der User-Anonymität in Mobile Payment Systemen / Feyyat Kaymaz." Kassel : Kassel University Press, 2011. http://d-nb.info/1023408163/34.
Повний текст джерелаPoole, Catherine G. "Dissociative Anonymity: Performative Photography and the Use of Uncanny Disguise." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/scripps_theses/787.
Повний текст джерелаČervinka, Zbyněk. "Rozšíření pro webový prohlížeč zaměřené na ochranu soukromí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385976.
Повний текст джерелаKhan, Ahsan Ahmad. "Effect of data caching on systemwide anonymity with users sending and receiving multiple messages." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5411.
Повний текст джерелаThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
Douglas, Judson. "Remote Internet elections and the use of blind digital signatures to protect voter anonymity /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1075709441&sid=22&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Повний текст джерелаScalpato, Lauren Ann. "Overcoming Anonymity: The Use of Autobiography in the Works Of Jane Austen and Charlotte Bronte." Thesis, Boston College, 2004. http://hdl.handle.net/2345/452.
Повний текст джерелаIn nineteenth-century England, women were struggling to find an outlet for the intelligence, emotions, and creativity that the patriarchal society around them continuously stifled. For women such as Jane Austen and Charlotte Brontë, writing served as an opportunity to defy restrictive social structures and offered a needed public voice. By expressing their own thoughts and frustrations, Austen and Brontë helped to overcome the anonymity imposed upon women of their time, as they illuminated the female experience. The following paper takes a look at the ways in which Austen and Brontë imparted autobiographical elements to their female characters, as both authors underwent important catharses and inspired the women around them. To this day, their literature provides critical insight into the troubled existence of the nineteenth-century woman, while revealing their own struggles with their constricted identities
Thesis (BA) — Boston College, 2004
Submitted to: Boston College. College of Arts and Sciences
Discipline: English
Discipline: College Honors Program
Книги з теми "User anonymity"
Mole, Tom. Celebrity and Anonymity. Edited by David Duff. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780199660896.013.30.
Повний текст джерелаWeimann, Gabriel. Terrorism and Counterterrorism on the Internet. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.420.
Повний текст джерелаCarlson, Matt. The Problems—and Promise—of Unnamed Sources. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0001.
Повний текст джерелаKeane, Adrian, and Paul McKeown. 5. Witnesses. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198811855.003.0005.
Повний текст джерелаCarlson, Matt. Deep Throat and the Question of Motives. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0005.
Повний текст джерелаKuijt, Ian. Clay Ideas. Edited by Timothy Insoll. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199675616.013.028.
Повний текст джерелаLi, Wai-Yee. Concepts of Authorship. Edited by Wiebke Denecke, Wai-Yee Li, and Xiaofei Tian. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199356591.013.24.
Повний текст джерелаGoodman, Jessica. Goldoni’s Dilemma. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198796626.003.0006.
Повний текст джерелаMartens, David. Data Science Ethics. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192847263.001.0001.
Повний текст джерелаWatt, Gary. Equity & Trusts Law Directions. 7th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.
Повний текст джерелаЧастини книг з теми "User anonymity"
Schreck, Jörg. "Requirements for Anonymity and Pseudonymity." In Security and Privacy in User Modeling, 37–46. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_5.
Повний текст джерелаSchreck, Jörg. "Solutions for Anonymity and Pseudonymity." In Security and Privacy in User Modeling, 67–94. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_7.
Повний текст джерелаJeon, Woongryul, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho Won. "Cryptanalysis of the User Authentication Scheme with Anonymity." In Future Generation Information Technology, 285–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27142-7_33.
Повний текст джерелаLee, Yung-Cheng. "Cryptanalysis on the User Authentication Scheme with Anonymity." In Advances in Intelligent Systems and Applications - Volume 2, 33–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35473-1_4.
Повний текст джерелаTruong, Toan-Thinh, Minh-Triet Tran, and Anh-Duc Duong. "Smart Card Based User Authentication Scheme with Anonymity." In Future Data and Security Engineering, 220–33. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12778-1_17.
Повний текст джерелаYoun, Taek-Youn, and Jongsung Kim. "Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity." In Lecture Notes in Electrical Engineering, 631–39. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2598-0_68.
Повний текст джерелаKim, Woo-Hun, Eun-Jun Yoon, and Kee-Young Yoo. "New Authentication Protocol Providing User Anonymity in Open Network." In Lecture Notes in Computer Science, 414–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11600930_41.
Повний текст джерелаTang, Mingdong, Sumeng Zeng, Jianxun Liu, and Buqing Cao. "Service Selection Based on User Privacy Risk Evaluation." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 308–20. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72389-1_25.
Повний текст джерелаJiang, Frank, Mingdong Tang, and Quang Anh Tran. "User Preference-Based Spamming Detection with Coupled Behavioral Analysis." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 466–77. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49148-6_38.
Повний текст джерелаRadhakrishnan, Niranchana, Marimuthu Karuppiah, Vijayakumar Pandi, and Md Zakirul Alam Bhuiyan. "Security on “A Lightweight Authentication Scheme with User Untraceability”." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 489–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72395-2_45.
Повний текст джерелаТези доповідей конференцій з теми "User anonymity"
Hu, Lanlan, Yixian Yang, and Xinxin Niu. "Improved Remote User Authentication Scheme Preserving User Anonymity." In Fifth Annual Conference on Communication Networks and Services Research (CNSR '07). IEEE, 2007. http://dx.doi.org/10.1109/cnsr.2007.38.
Повний текст джерелаMimi, Anissa, and Safia Nait Bahloul. "Protect user anonymity in query log." In 2010 International Conference on Machine and Web Intelligence (ICMWI). IEEE, 2010. http://dx.doi.org/10.1109/icmwi.2010.5648160.
Повний текст джерелаSajjadi Jahromi, S. Hossein, and M. Hossein Mehraban Jahromi. "Optimization of User Identification Scheme with Preserving User Anonymity." In 2010 2nd International Conference on Mechanical and Electrical Technology (ICMET). IEEE, 2010. http://dx.doi.org/10.1109/icmet.2010.5598404.
Повний текст джерелаRadenkovic, Milena, and Ivan Vaghi. "Adaptive user anonymity for mobile opportunistic networks." In the seventh ACM international workshop. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2348616.2348635.
Повний текст джерелаCampan, Alina, Traian Marius Truta, and Nicholas Cooper. "User-controlled generalization boundaries forp-sensitivek-anonymity." In the 2010 ACM Symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1774088.1774317.
Повний текст джерелаShao, Shuai, Hui Li, Xinxi Niu, and Yixian Yang. "A Remote User Authentication Scheme Preserving User Anonymity and Traceability." In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2009. http://dx.doi.org/10.1109/wicom.2009.5301900.
Повний текст джерелаBapana, Surekha, K. Lakshmi Narayana, and Chandra Sekhar Vorugunti. "An energy efficient remote user authentication scheme preserving user anonymity." In 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019600.
Повний текст джерелаYoon, Eun-Jun, and Kee-Young Yoo. "Vulnerability of User Identification and Key Agreement Protocol with User Anonymity." In Future Generation Communication and Networking (FGCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/fgcn.2007.231.
Повний текст джерелаKim, Seil, Ji Young Chun, and Dong Hoon Lee. "Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.64.
Повний текст джерелаChen, Shang-Wen, and Raylin Tso. "NFC-based Mobile Payment Protocol with User Anonymity." In 2016 11th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2016. http://dx.doi.org/10.1109/asiajcis.2016.30.
Повний текст джерела