Value of anonymity

被引:0
|
作者
Schneider, Karl
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] ON ANONYMITY
    HAMMOND, N
    AMERICAN ANTIQUITY, 1984, 49 (01) : 161 - 163
  • [22] Anonymity
    Hyvernaud, Georges
    SINN UND FORM, 2013, 65 (05): : 629 - 635
  • [23] ANONYMITY
    PATEY, DH
    LANCET, 1948, 252 (NOV27): : 872 - 872
  • [24] Towards an anti-inference (K, l)-anonymity model with value association rules
    Li, Zude
    Zhan, Guoqiang
    Ye, Xiaojun
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 883 - 893
  • [25] gPHI: Lightweight Anonymity Protocol for Anonymity at Host and AS Levels
    Yoshinaka, Yutaro
    Takemasa, Junji
    Koizumi, Yuki
    Hasegawa, Toru
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [26] A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System
    Wang Liang
    Guo Yajun
    Yan Huifang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 254 - 257
  • [27] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    CYBERSECURITY, 2023, 6 (01)
  • [28] Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System
    Mulazzani, Martin
    Huber, Markus
    Weippl, Edgar R.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (05): : 539 - 546
  • [29] Discussing Anonymity Metrics for Mix Based Anonymity Approaches
    Dang Vinh Pham
    Wright, Joss
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 149 - 168
  • [30] The Causality Test of Network Technical Anonymity and Perceptive Anonymity
    Chen, Xi
    Li, Yujie
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 279 - 287