Добірка наукової літератури з теми "User anonymity"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "User anonymity".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "User anonymity":

1

Peddinti, Sai Teja, Keith W. Ross, and Justin Cappos. "User Anonymity on Twitter." IEEE Security & Privacy 15, no. 3 (2017): 84–87. http://dx.doi.org/10.1109/msp.2017.74.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Li, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the new scheme is more secure and efficient for wireless communications.
3

An, Young Hwa. "Security Weaknesses and Improvements of a Remote User Authentication Scheme Preserving User Anonymity." Applied Mechanics and Materials 145 (December 2011): 184–88. http://dx.doi.org/10.4028/www.scientific.net/amm.145.184.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has asserted that the scheme is secure against replay attack, guessing attack, insider attack and man-in-the-middle attack, etc. However, in this paper, we have shown that Bindu et al.'s scheme is still insecure against man-in-the-middle attack and password guessing attack, and does not provide user anonymity. Also, we propose an improved scheme to withstand these weaknesses, while preserving their merits, even if the secret information stored in the smart card is revealed. As a result of analysis, the proposed scheme is secure against user impersonation attack, server masquerading attack, password guessing attack and does provide user anonymity. And we can see that the proposed scheme is relatively more effective than Bindu et al.'s scheme.
4

Choi, Jong-Seok, and Seung-Soo Shin. "Traceable Authentication Scheme Providing User Anonymity." Journal of the Korea Contents Association 9, no. 4 (April 28, 2009): 95–102. http://dx.doi.org/10.5392/jkca.2009.9.4.095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

KANG, Miyoung, Hyun Sook RHEE, and Jin-Young CHOI. "Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 2 (2011): 860–64. http://dx.doi.org/10.1587/transfun.e94.a.860.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tseng, Huei-Ru, Rong-Hong Jan, and Wuu Yang. "A bilateral remote user authentication scheme that preserves user anonymity." Security and Communication Networks 1, no. 4 (July 2008): 301–8. http://dx.doi.org/10.1002/sec.26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wu, Shuhua, Yuefei Zhu, and Qiong Pu. "Robust smart-cards-based user authentication scheme with user anonymity." Security and Communication Networks 5, no. 2 (April 28, 2011): 236–48. http://dx.doi.org/10.1002/sec.315.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Das, Debajyoti, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. "Comprehensive Anonymity Trilemma: User Coordination is not enough." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 356–83. http://dx.doi.org/10.2478/popets-2020-0056.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractFor anonymous communication networks (ACNs), Das et al. recently confirmed a long-suspected trilemma result that ACNs cannot achieve strong anonymity, low latency overhead and low bandwidth overhead at the same time. Our paper emanates from the careful observation that their analysis does not include a relevant class of ACNs with what we call user coordination where users proactively work together towards improving their anonymity. We show that such protocols can achieve better anonymity than predicted by the above trilemma result. As the main contribution, we present a stronger impossibility result that includes all ACNs we are aware of. Along with our formal analysis, we provide intuitive interpretations and lessons learned. Finally, we demonstrate qualitatively stricter requirements for the Anytrust assumption (all but one protocol party is compromised) prevalent across ACNs.
9

Shin, Kwang-Cheul. "A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity." Journal of Society for e-Business Studies 18, no. 2 (May 31, 2013): 81–93. http://dx.doi.org/10.7838/jsebs.2013.18.2.081.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chandrakar, Preeti, and Hari Om. "RSA Based Two-factor Remote User Authentication Scheme with User Anonymity." Procedia Computer Science 70 (2015): 318–24. http://dx.doi.org/10.1016/j.procs.2015.10.023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "User anonymity":

1

Pajunen, Mihkel. "An Evaluation of User Attitudes Towards Anonymity in Bitcoin." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-14120.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Bitcoin has emerged as the leading cryptographic currency since its inception in 2009 and at the time of writing holds a market capitalization of $28.4 billion. This ever-increasing figure has attracted adopters seeking to advance their investments, often leaving purely technical aspects on the sidelines. As is the case with any innovative technology, misconceptions are plentiful and information is not always conclusive. The research effort presented in this paper consists of a quantitative study seeking to address the subject of user anonymity in the Bitcoin network by employing an online survey on one of the most prominent Bitcoin forums. This includes 50 eligible participants, whose motivation is derived through the application of temporal motivation theory. The survey seeks to form an understanding of user attitudes towards the aspect of anonymity by following a methodological approach for exploring common tendencies among the representatives and will serve as the underlying data set from which conclusions can be drawn. Furthermore, this paper will present a literary study of the actual state of anonymity in this peer-to-peer technology by reviewing current findings highlighted in the area, thus presenting a comprehensive view of anonymity in the Bitcoin network, which will contrast the user study.
2

Boldyreva, Alexandra. "Public-key encryption in the multi-user setting : privacy, anonymity and efficiency /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3137232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Abreu, Giovanna Oliveira Lima de. "A soberania dos dados versus a autonomia do usuário: Big Data, Internet das Coisas e as estratégias afirmativas do anonimato." Universidade Federal da Paraíba, 2015. http://tede.biblioteca.ufpb.br:8080/handle/tede/7897.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Submitted by Clebson Anjos (clebson.leandro54@gmail.com) on 2016-02-18T18:09:26Z No. of bitstreams: 1 arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5)
Made available in DSpace on 2016-02-18T18:09:26Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5) Previous issue date: 2015-05-29
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The interaction between society and technology in the context of mediated ambience, enhanced by processes and tools such as Big Data and Internet of Things are the basis of scientific advances that are gradually transforming our daily lives. With the Big Data phenomenon we are able to capture a massive quantity of data, creating endless possibilities of connections and control. The Internet of Things, in turn, is related to embedded devices networks that communicate with each other in an automated way to help make our lives more efficient and more vulnerable too. In the era of pervasive computing and datafication, any attempt to safeguard our data seems insufficient. So, this study presents a reflection on the existing oppositeness between the ideas of freedom as an essential attribute for online information sharing and the sovereignty imposed by the data control, besides we also examine the implications of this surveillance on the user autonomy. To understand the links between the mediations, the network and the members of this interconnected system, we adopted the Actor-Network Theory (LATOUR, 2012). This theory of social also inserts itself as the methodology, laying the foundations for guiding this study. Another important point is to understand the conceptual differences between surveillance, control and monitoring (LEMOS, 2009). The work, divided into two parts and their respective chapters, also includes the analysis of some attempts of resistance to this control imposed on members of the interconnected public sphere, and it points out the paradoxes concerning, particularly, to anonymity, one of the main forms of opposition to the monitoring state established in the net. Since we are in the middle of a still in progress process, accurate and airtight conclusions are not possible. However, if we are not able to set limits to the new digital society, then we run a risk of seeing vital rights, essential to the proper functioning of society, wrecked in the name of innovation and convenience.
A interação entre sociedade e tecnologia presente no contexto da midiatização, potencializada por processos e ferramentas como o Big Data e a Internet das Coisas são a base de avanços científicos que vêm, paulatinamente, transformando o nosso cotidiano. Com o fenômeno do Big Data capta-se uma torrente de dados, gerando infinitas possibilidades de conexões e controle. A Internet das Coisas, por sua vez, está relacionada às redes de dispositivos embarcados que se comunicam uns com os outros de forma automatizada para ajudar a tornar nossas vidas mais eficientes, porém mais vulneráveis. Na era da computação pervasiva e da dataficação, qualquer tentativa de salvaguardar nossos dados parece insuficiente. Assim, este estudo traz uma reflexão sobre o oposicionismo entre as ideias de liberdade como atributo essencial para o compartilhamento de informações online e a soberania conquistada através do controle dos dados, além de examinar as implicações da vigilância sobre a autonomia do usuário. Para compreender os vínculos entre as mediações, a rede e os integrantes desse sistema interconectado, adotamos a Teoria Ator-Rede (LATOUR, 2012). Essa teoria do social insere-se também como metodologia, lançando os princípios norteadores para elaboração da pesquisa. Outro ponto relevante é a compreensão das diferenças conceituais entre as ações de vigilância, controle e monitoramento (LEMOS, 2009). O trabalho, dividido em duas partes e seus respectivos capítulos, conta ainda com a análise de algumas tentativas de resistência ao controle imposto aos integrantes da esfera pública interconectada, e com apontamentos às antinomias referentes, em específico, ao anonimato, uma das principais formas de oposição ao monitoramento instaurado na rede. Por estarmos diante de um processo em franco desenvolvimento, conclusões exatas e certeiras não são possíveis. Todavia, se não formos, desde já, capazes de estabelecer limites para essa nova sociedade digital, então correremos o risco de vermos naufragar direitos vitais para o bom funcionamento da sociedade em prol da inovação e da conveniência.
4

Hoang, Van-Hoan. "Securing data access and exchanges in a heterogeneous ecosystem : An adaptive and context-sensitive approach." Thesis, La Rochelle, 2022. http://www.theses.fr/2022LAROS009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les services de stockage et de partage de données basés sur le Cloud sont largement adoptés depuis des décennies. Le modèle sous-jacent permet aux utilisateurs de minimiser le coût de services en étant en mesure d'accéder et de partager des données facilement. Dans ce contexte, la sécurité est essentielle pour protéger les utilisateurs et leurs ressources. Concernant les utilisateurs, ils doivent prouver leur éligibilité pour pouvoir accéder aux ressources. Cependant, l’envoi direct des informations personnelles permet aux fournisseurs de services de détecter qui partage des données avec qui et de corréler leurs activités. Quant aux données, en raison de la complexité du déploiement d'un système de gestion de clés, elles ne sont pas chiffrées par les utilisateurs mais par les fournisseurs de services. Cela leur permet de les lire en clair. Dans la thèse, nous créons tout d’abord un protocole d’authentification et d'échange de clés basé sur un mot de passe qui permet de sécuriser des échanges entre des utilisateurs et des fournisseurs de services. Deuxièmement, nous construisons une PKI décentralisée qui permet de créer des protocoles d'authentification en préservant la vie privée des utilisateurs. Troisièmement, nous concevons deux schémas de chiffrement à base d’attributs. Ces schémas fournissent des systèmes de gestion de clés efficaces pour protéger des données en conservant la capacité de les partager avec d'autres. Enfin, nous construisons une plateforme de partage de données en tirant parti de la technologie blockchain. La plateforme garantit une haute disponibilité, la confidentialité des données, un contrôle d’accès sécurisé, et la vie privée des utilisateurs
Cloud-based data storage and sharing services have been proven successful since the last decades. The underlying model helps users not to expensively spend on hardware to store data while still being able to access and share data anywhere and whenever they desire. In this context, security is vital to protecting users and their resources. Regarding users, they need to be securely authenticated to prove their eligibility to access resources. As for user privacy, showing credentials enables the service provider to detect sharing-related people or build a profile for each. Regarding outsourced data, due to complexity in deploying an effective key management in such services, data is often not encrypted by users but service providers. This enables them to read users’ data. In this thesis, we make a set of contributions which address these issues. First, we design a password-based authenticated key exchange protocol to establish a secure channel between users and service providers over insecure environment. Second, we construct a privacy-enhancing decentralized public key infrastructure which allows building secure authentication protocols while preserving user privacy. Third, we design two revocable ciphertext-policy attribute-based encryption schemes. These provide effective key management systems to help a data owner to encrypt data before outsourcing it while still retaining the capacity to securely share it with others. Fourth, we build a decentralized data sharing platform by leveraging the blockchain technology and the IPFS network. The platform aims at providing high data availability, data confidentiality, secure access control, and user privacy
5

Kaymaz, Feyyat [Verfasser]. "User-Anonymität in Mobile Payment Systemen. Ein Referenzmodell zur Gestaltung der User-Anonymität in Mobile Payment Systemen / Feyyat Kaymaz." Kassel : Kassel University Press, 2011. http://d-nb.info/1023408163/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Poole, Catherine G. "Dissociative Anonymity: Performative Photography and the Use of Uncanny Disguise." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/scripps_theses/787.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In my thesis project, I aim to explore the ways in which we can perform parts of our identity by hiding the body through the use of performative disguises. These characters transgress the boundaries between societal norms and abject interactions. In these costumes, I hope to find whether or not the multiple facets of our identities can be distilled into one character--whether the self can be shifted into another character for a constructive narrative.
7

Červinka, Zbyněk. "Rozšíření pro webový prohlížeč zaměřené na ochranu soukromí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385976.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis deals with security, privacy, and anonymity on the internet. In this thesis are described tracking mechanisms and approaches that are being used to collect and send away users' personal information. Information that leaks using this tracking approaches can be used to identify user, to monitor and analyze his behavior on specific web pages and several leaked pieces of information can be misused (for example the leaked credit card number or password). In this thesis is described and tested the functionality and reliability of several current web add-ons providing the protection on the internet. New security increasing web add-on has been designed and developed to demonstrate a technique, that redefines and wraps the original JavaScript implementation of several functions and objects, the wrapping is executed before the visited web page starts processing the source code. Running the wrapping code at this time will ensure, that no other code in loaded web page will ever have access to the original implementation. This add-on is also well-tested. The final thesis' stage provides a great amount of possibilities to improve implemented add-on.
8

Khan, Ahsan Ahmad. "Effect of data caching on systemwide anonymity with users sending and receiving multiple messages." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5411.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data caching is a well-acknowledged method for reducing access times to commonly requested data. Data caching yields considerable results when employed in communication systems that exhibit bidirectional communication, such as web browsing. This technique has been used in anonymous networks to increase the overall anonymity provided by the system. With the increasing number of anonymous networks in place today, the need arises for a metric in order to differentiate the degree of anonymity provided by these systems. This thesis presents a method to compute the degree of anonymity provided by such systems. The model focuses on an anonymous system employing data caching and builds on existing related work in order to allow senders to send multiple messages and receivers to receive multiple messages. A systemwide metric is proposed for measuring the anonymity provided by such systems and is then tested under special conditions. The thesis concludes with an analysis of a pool mix system employing data caching.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
9

Douglas, Judson. "Remote Internet elections and the use of blind digital signatures to protect voter anonymity /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1075709441&sid=22&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Scalpato, Lauren Ann. "Overcoming Anonymity: The Use of Autobiography in the Works Of Jane Austen and Charlotte Bronte." Thesis, Boston College, 2004. http://hdl.handle.net/2345/452.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis advisor: Susan Michalczyk
In nineteenth-century England, women were struggling to find an outlet for the intelligence, emotions, and creativity that the patriarchal society around them continuously stifled. For women such as Jane Austen and Charlotte Brontë, writing served as an opportunity to defy restrictive social structures and offered a needed public voice. By expressing their own thoughts and frustrations, Austen and Brontë helped to overcome the anonymity imposed upon women of their time, as they illuminated the female experience. The following paper takes a look at the ways in which Austen and Brontë imparted autobiographical elements to their female characters, as both authors underwent important catharses and inspired the women around them. To this day, their literature provides critical insight into the troubled existence of the nineteenth-century woman, while revealing their own struggles with their constricted identities
Thesis (BA) — Boston College, 2004
Submitted to: Boston College. College of Arts and Sciences
Discipline: English
Discipline: College Honors Program

Книги з теми "User anonymity":

1

Mole, Tom. Celebrity and Anonymity. Edited by David Duff. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780199660896.013.30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter argues that the discourses, understandings, and practices surrounding the attribution of literary works changed significantly during the Romantic period. It examines the wide range of attribution styles that were available in the period, including the use of initials, phrases such as ‘by a Lady’, invented names such as Malachi Malagrowther (Walter Scott), and the formula ‘by the author of’. Drawing on a quantitative analysis of the bibliographical record, it shows how the popularity of anonymous publication shifted during the period in different ways for novels and poetry volumes. These changes were bound up with the emergence of modern celebrity culture. The chapter suggests that celebrity, anonymity, and pseudonymity were not opposed to one another, but were complexly intertwined, so that anonymity could be a form of celebrity and (paradoxically) celebrity could be a form of anonymity.
2

Weimann, Gabriel. Terrorism and Counterterrorism on the Internet. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.420.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The internet has emerged as an important medium for terrorists. Two key trends can be discerned from cyberterrorism: the democratization of communications driven by user generated content on the internet, and modern terrorists’ growing awareness of the internet’s potential for their purposes. The internet has become a favorite tool of the terrorists because of the many advantages it provides, such as easy access; little or no regulation, censorship, or other forms of government control; potentially huge audiences spread throughout the world; anonymity of communication; fast flow of information; interactivity; inexpensive development and maintenance of a Web presence; a multimedia environment; and the ability to influence coverage in the traditional mass media. These advantages make the network of computer-mediated communication ideal for terrorists-as-communicators. Terrorist groups of all sizes maintain their own websites to spread propaganda, raise funds and launder money, recruit and train members, communicate and conspire, plan and launch attacks. They also rely on e-mail, chatrooms, e-groups, forums, virtual message boards, and resources like YouTube, Facebook, and Google Earth. Fighting online terrorism raises the issue of countermeasures and their cost. The virtual war between terrorists and counterterrorism forces and agencies is certainly a vital, dynamic, and ferocious one. It is imperative that we become better informed about the uses to which terrorists put the internet and better able to monitor their activities. Second, we must defend our societies better against terrorism without undermining the very qualities and values that make our societies worth defending.
3

Carlson, Matt. The Problems—and Promise—of Unnamed Sources. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This introductory chapter elaborates on this study's premise and provides a brief overview of the use of unnamed sources in American journalism. It demonstrates how anonymity alters the underlying relationship among news sources, journalists, and audiences. In contrast to conventional attribution, the absence of a source's identity leads to unique risks and rewards that prove difficult to disentangle. Both arise from the bargain struck when a journalist grants anonymity: the identity of the source is withheld to obtain and distribute otherwise unattainable information. This loss of transparency exposes journalists who rely on unnamed sources to challenges over the accuracy of the information provided and the intentions of all those involved. What emerges is a set of extremes as unnamed sources contribute to journalism's greatest triumphs and its most shameful episodes.
4

Keane, Adrian, and Paul McKeown. 5. Witnesses. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198811855.003.0005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter discusses the following: (i) the competence and compellability of witnesses (including the special rules that apply in the case of the accused, the spouse or civil partner of an accused, persons with a disorder or disability of the mind, the Sovereign, diplomats, and bankers); (ii) oaths and affirmations; (iii) the use of live links; (iv) the time at which evidence should be adduced; (v) witnesses in civil cases (including the witnesses to be called and the use of witness statements); (vi) witnesses in criminal cases (including the witnesses to be called, the order of witnesses, evidence-in-chief by video-recording and special measures directions for vulnerable and intimidated witnesses); (vii) witness anonymity; and (viii) witness training and familiarization.
5

Carlson, Matt. Deep Throat and the Question of Motives. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter begins two weeks after Newsweek's retraction when Vanity Fair ended over thirty years of speculation by revealing the famous Watergate-era unnamed source Deep Throat to be Mark Felt, an ex-FBI official. In contrast to the other incidents, the journalism community celebrated Deep Throat as a triumph of unnamed source use. Drawing on the collective memory of Watergate, journalists reaffirmed the value of using unnamed sources to expose wrongdoing. The heroic interpretation of Felt encountered resistance from others who questioned Felt's motives and actions. In the larger view, these critics railed against anonymity by promoting an alternative normative argument suggesting government employees should work internally to resolve issues rather than in public through journalists.
6

Kuijt, Ian. Clay Ideas. Edited by Timothy Insoll. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199675616.013.028.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Beginning around 11,500 years ago, the Neolithic of the Near East encompassed some of the most profound and fundamental innovations in our species’ history. This included the establishment of the earliest sedentary villages, founded by food-producing communities who relied on wild and domesticated plants and animals for subsistence. Major changes were also seen in use of imagery, both anthropomorphic and zoomorphic, in concert with society’s struggle to control new structures of economy, social organization, and symbolism. This chapter explores how Near Eastern Neolithic figurine use changed through time, and considers how competing interpretive frameworks of phallocentrism and Goddess worship present alternative frameworks of understanding broader social meanings within these communities. Moreover, the frequency of objects, the design, and miniaturization of these objects provide insight into how Neolithic people deliberately created ambiguity and anonymity when they crafted anthropomorphic figurines.
7

Li, Wai-Yee. Concepts of Authorship. Edited by Wiebke Denecke, Wai-Yee Li, and Xiaofei Tian. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199356591.013.24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
What are the words and phrases used to designate authorship in classical Chinese literature? What are the anecdotes and stories told to emblematize or dramatize the contexts and meanings of authorship? How does the attribution to or the invention of an author define or control the meanings of a text? How do markers of authorial presence function in a text? How does genre shape authorial voice? How do anonymous texts generate authors? How do images of authors (as distinct from historical actors) produce texts? Many scholars believe that authorship becomes increasingly individualistic and self-conscious for the period covered by this volume. How valid is this historical trajectory? In exploring these questions, this chapter examines notions of orality, textual authority, textual transmission, patronage, commentary, editorial labor, forgery, anonymity, originality, imitation, and collective authorship.
8

Goodman, Jessica. Goldoni’s Dilemma. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198796626.003.0006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter considers how, in his two years at the Comédie-Italienne, Goldoni attempted to control his image and assert his authority in a new, problematic context of collective authorship and normative anonymity. It employs the few remaining traces of canevas Goldoni wrote for the Comédie-Italienne—anonymous manuscripts, summaries in contemporary journals, and adaptations for the Italian stage—along with texts written before his arrival in Paris to explore the techniques he developed in the moment for creating and maintaining a good name. The first of these is the creation of a proto-directorial role to control how his work was conveyed to theatre audiences, and the second is the use of the written press to construct an image in print where direct publication was not possible.
9

Martens, David. Data Science Ethics. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192847263.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data science ethics is all about what is right and wrong when conducting data science. Data science has so far mainly been used for positive outcomes for businesses and society. However, just as with any technology, data science has also come with some negative consequences: an increase of privacy invasion, data-driven discrimination against sensitive groups, and decision making by complex models without explanations. This book looks at the different concepts and techniques related to data science ethics. Data scientists and business managers are not inherently unethical, but at the same time not trained to think this through either. This book aims to address this important gap. The techniques discussed range from k-anonymity and differential privacy to homomorphic encryption and zero-knowledge proofs to address privacy concerns, measurements to assess, and techniques to remove discrimination against sensitive groups, and various explainable AI techniques. The real-life cautionary tales further illustrate the importance and potential impact of data science ethics, including tales of racist bots, search censoring, government backdoors, discrimination in recruitment, predicting pregnancy, redlining, re-identification of persons based on movie viewing and location data, cheating academics, and face recognition. Additionally, 10 discussions are provided with hypothetical scenarios, for example:‘you are the founder of a startup …’, which then present an ethical dilemma related to data science. These can serve as structured exercises to be completed with your fellow colleagues, and will teach you how to balance the ethical concerns and the utility of your data.
10

Watt, Gary. Equity & Trusts Law Directions. 7th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Without assuming prior legal knowledge, books in the Directions series introduce and guide readers through key points of law and legal debate. Questions, diagrams and exercises help readers to engage fully with each subject and check their understanding as they progress. This book explains the key topics covered on equity and trusts courses. The content of the text is designed to emphasise the relationship between equity, trusts, property, contract and restitution to enable students to map out conceptual connections between related legal ideas. There is also a focus on modern cases in the commercial sphere to reflect the constantly changing and socially significant role of trusts and equity. The book starts by introducing equity and trusts. It then includes a chapter on understanding trusts, and moves on to consider capacity and formality requirements, certainty requirements and the constitution of trusts. Various types of trusts are then examined such as purpose, charitable, and variation trusts. The book then describes issues related to trusteeship. Breach of trust is explained, as is informal trusts of land. There is a chapter on tracing, and then the book concludes by looking at equitable liability of strangers to trust and equitable doctrines and remedies. This new edition includes coverage of significant recent cases, including the Supreme Court decision on interest to be paid by tax authorities on monies owed; the Supreme Court decision on the test of dishonesty applicable to civil matters; the Privy Council decision on the division of investment property acquired by cohabitants; the Court of Appeal decisions on Quistclose trusts; fiduciary duties in arms-length contracts; transactions prejudicing creditors; beneficiary anonymity in variation of trust cases; exemption clauses; discretion exercised beyond trustee’s authority; implications of GDPR for trustee disclosures; trustee personal liability; causation and equitable compensation; statutory relief for a professional trustee’s breach of trust; use of proprietary estoppel to reward work undertaken in farming families; costs of seeking court’s directions; injunctions ordered against persons unknown; equitable jurisdiction to rectify agreements.

Частини книг з теми "User anonymity":

1

Schreck, Jörg. "Requirements for Anonymity and Pseudonymity." In Security and Privacy in User Modeling, 37–46. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Schreck, Jörg. "Solutions for Anonymity and Pseudonymity." In Security and Privacy in User Modeling, 67–94. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jeon, Woongryul, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, and Dongho Won. "Cryptanalysis of the User Authentication Scheme with Anonymity." In Future Generation Information Technology, 285–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27142-7_33.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lee, Yung-Cheng. "Cryptanalysis on the User Authentication Scheme with Anonymity." In Advances in Intelligent Systems and Applications - Volume 2, 33–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35473-1_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Truong, Toan-Thinh, Minh-Triet Tran, and Anh-Duc Duong. "Smart Card Based User Authentication Scheme with Anonymity." In Future Data and Security Engineering, 220–33. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12778-1_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Youn, Taek-Youn, and Jongsung Kim. "Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity." In Lecture Notes in Electrical Engineering, 631–39. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2598-0_68.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kim, Woo-Hun, Eun-Jun Yoon, and Kee-Young Yoo. "New Authentication Protocol Providing User Anonymity in Open Network." In Lecture Notes in Computer Science, 414–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11600930_41.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tang, Mingdong, Sumeng Zeng, Jianxun Liu, and Buqing Cao. "Service Selection Based on User Privacy Risk Evaluation." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 308–20. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72389-1_25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jiang, Frank, Mingdong Tang, and Quang Anh Tran. "User Preference-Based Spamming Detection with Coupled Behavioral Analysis." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 466–77. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49148-6_38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Radhakrishnan, Niranchana, Marimuthu Karuppiah, Vijayakumar Pandi, and Md Zakirul Alam Bhuiyan. "Security on “A Lightweight Authentication Scheme with User Untraceability”." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 489–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72395-2_45.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "User anonymity":

1

Hu, Lanlan, Yixian Yang, and Xinxin Niu. "Improved Remote User Authentication Scheme Preserving User Anonymity." In Fifth Annual Conference on Communication Networks and Services Research (CNSR '07). IEEE, 2007. http://dx.doi.org/10.1109/cnsr.2007.38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mimi, Anissa, and Safia Nait Bahloul. "Protect user anonymity in query log." In 2010 International Conference on Machine and Web Intelligence (ICMWI). IEEE, 2010. http://dx.doi.org/10.1109/icmwi.2010.5648160.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sajjadi Jahromi, S. Hossein, and M. Hossein Mehraban Jahromi. "Optimization of User Identification Scheme with Preserving User Anonymity." In 2010 2nd International Conference on Mechanical and Electrical Technology (ICMET). IEEE, 2010. http://dx.doi.org/10.1109/icmet.2010.5598404.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Radenkovic, Milena, and Ivan Vaghi. "Adaptive user anonymity for mobile opportunistic networks." In the seventh ACM international workshop. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2348616.2348635.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Campan, Alina, Traian Marius Truta, and Nicholas Cooper. "User-controlled generalization boundaries forp-sensitivek-anonymity." In the 2010 ACM Symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1774088.1774317.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Shao, Shuai, Hui Li, Xinxi Niu, and Yixian Yang. "A Remote User Authentication Scheme Preserving User Anonymity and Traceability." In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2009. http://dx.doi.org/10.1109/wicom.2009.5301900.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bapana, Surekha, K. Lakshmi Narayana, and Chandra Sekhar Vorugunti. "An energy efficient remote user authentication scheme preserving user anonymity." In 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019600.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yoon, Eun-Jun, and Kee-Young Yoo. "Vulnerability of User Identification and Key Agreement Protocol with User Anonymity." In Future Generation Communication and Networking (FGCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/fgcn.2007.231.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kim, Seil, Ji Young Chun, and Dong Hoon Lee. "Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.64.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chen, Shang-Wen, and Raylin Tso. "NFC-based Mobile Payment Protocol with User Anonymity." In 2016 11th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2016. http://dx.doi.org/10.1109/asiajcis.2016.30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії