Filters








2,835 Hits in 8.4 sec

The Faith of John Dryden: Change and Continuity

Phillip Harth, G. Douglas Atkins
1981 Eighteenth-Century Studies  
In such a passage as the following, where the allegory is obvious, the Good Parson, who is appropriately anonymous, becomes the standard by which the de jure clergy's worldliness and ambition are judged  ...  In opposition to Clifford, Warren, and Buckingham, Dryden could have found in the controversy they generated a not-altogether-surprising ally in the anonymous Catholic author of Reason Regulated.  ... 
doi:10.2307/2738245 fatcat:nfyrkph5qvgazoxuuac56cok5a

SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels

A. Karimi Rizi, M. Naderi Dehkordi, N. Nemat bakhsh
2019 Security and Communication Networks  
This paper presents a supervised anonymization technique, SNI (social network immunization), to publish social networks having multiple sensitive labels with correlation.  ...  The practical evaluation of the cancer code label of individuals also indicates the effectiveness of the SNI method.  ...  Anonymization usually provides an opportunity for the data holder to anonymize the sensitive information of data owners before publishing raw data of social networks.  ... 
doi:10.1155/2019/8171263 fatcat:rgmapte32bb4ljgeisedp7d3om

DeNASA: Destination-Naive AS-Awareness in Anonymous Communications

Armon Barton, Matthew Wright
2016 Proceedings on Privacy Enhancing Technologies  
Then, we test the accuracy of Qiu and Gao AS-level path inference on identifying the presence of these ASes in the path, and we show that inference accuracy is 90%.  ...  To this end, we first identify the most probable ASes to be traversed by Tor streams. We call this set of ASes the Suspect AS list and find that it consists of eight highest ranking Tier 1 ASes.  ...  In particular, we thank our shepherds Roger Dingledine and Paul Syverson, as well as the other anonymous reviewers for introducing the guard placement attack and providing insight that greatly helped improve  ... 
doi:10.1515/popets-2016-0044 dblp:journals/popets/BartonW16 fatcat:j6alhrxdmbg57mpnbjlquqedde

Size matters: How population size influences genotype–phenotype association studies in anonymized data

Raymond Heatherly, Joshua C. Denny, Jonathan L. Haines, Dan M. Roden, Bradley A. Malin
2014 Journal of Biomedical Informatics  
Formal anonymization algorithms (e.g., k-anonymization) can prevent such violations, but prior studies suggest that the size of the population available for anonymization may influence the utility of the  ...  This research implies that regardless of the overall size of an institution's data, there may be significant benefits to anonymization of the entire EMR, even if the institution is planning on releasing  ...  The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.  ... 
doi:10.1016/j.jbi.2014.07.005 pmid:25038554 pmcid:PMC4260994 fatcat:qt6fonjcjrfdtbpvx64adict4a

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

Amirali Sanatinia, Guevara Noubir
2015 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks  
We first, introduce OnionBots, what we believe will be the next generation of resilient, stealthy botnets.  ...  We contend that the next waves of botnets will extensively attempt to subvert privacy infrastructure and cryptographic mechanisms.  ...  A more long term approach involves making changes to the Tor, such as use of CAPTACHAs, throttling entry guards and reusing failed partial circuits, as described in [61] .  ... 
doi:10.1109/dsn.2015.40 dblp:conf/dsn/SanatiniaN15 fatcat:p2gz3vpjubcxvlcqmddmkfduhq

Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network [article]

Nguyen Phong Hoang
2016 arXiv   pre-print
correlation attacks in the Tor network.  ...  In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet topology, ASmoniTor is an online system that assists  ...  to observe 39.4% of all randomly generated anonymous paths.  ... 
arXiv:1610.02065v1 fatcat:vqnsgsxnn5botkta56lxkijtiy

Performance and Security Improvements for Tor

Mashael Alsabah, Ian Goldberg
2016 ACM Computing Surveys  
Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network  ...  Tor [Dingledine et al. 2004 ] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers.  ...  The statements made herein are solely the responsibility of the authors.  ... 
doi:10.1145/2946802 fatcat:xbhzj55r2vfs5hzt6dmxdffy6i

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks [article]

Amirali Sanatinia, Guevara Noubir
2015 arXiv   pre-print
We first, introduce OnionBots, what we believe will be the next generation of resilient, stealthy botnets.  ...  We contend that the next waves of botnets will extensively subvert privacy infrastructure and cryptographic mechanisms.  ...  A more long term approach involves making changes to the Tor, such as use of CAPTACHAs, throttling entry guards and reusing failed partial circuits, as described in [61] .  ... 
arXiv:1501.03378v1 fatcat:mnaicsvxdzbxlkvfcjr53qdf5i

Characterising bias in regulatory risk and decision analysis: An analysis of heuristics applied in health technology appraisal, chemicals regulation, and climate change governance

Brian H. MacGillivray
2017 Environment International  
empirical or theoretical justifications; using sensitivity analysis, simulations, multiple bias analysis, and deductive systems of inference (e.g. directed acyclic graphs) to characterise rule uncertainty  ...  We highlight the problem of ruleentrenchment, where analytical choices that are in principle contestable are arbitrarily fixed in practice, masking uncertainty and potentially introducing bias.  ...  Anonymous reviewers provided helpful comments. The usual caveats remain.  ... 
doi:10.1016/j.envint.2017.05.002 pmid:28499120 fatcat:ddjp4jt5ebcixjfnq6ivpnm4u4

Trustworthy opportunistic sensing: A Social Computing Paradigm

Henric Johnson, Niklas Lavesson, Daniela Oliveira, S. Felix Wu
2011 2011 IEEE International Conference on Information Reuse & Integration  
Given the availability of both digitized social informatics and sensor content, we now have the option to examine these sources simultaneously.  ...  We refer to this new era as the Social Computing Paradigm, and we argue that it could be particularly useful in conjunction with opportunistic sensing.  ...  Social informatics also includes the communication activities or interactions over a graph of social relationships, and the policy, such as privacy or anonymity, guarding those activities.  ... 
doi:10.1109/iri.2011.6009608 dblp:conf/iri/JohnsonLOW11 fatcat:6ltaztftobb7na272ucrttwu2y

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
2017 Proceedings on Privacy Enhancing Technologies  
We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful  ...  We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems.  ...  The authors would like to thank the reviewers for insightful comments that helped improving the paper, in particular Prateek Mittal for acting as shepherd.  ... 
doi:10.1515/popets-2017-0056 dblp:journals/popets/TroncosoIDH17 fatcat:uole5gkxeravhful25scijakpa

Bribecaster

Manas Mittal, Wei Wu, Steve Rubin, Sam Madden, Björn Hartmann
2012 Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion - CSCW '12  
Participants in our first-use user study of Bribecaster rated the system highly for its usefulness.  ...  This citizen-induced transparency facilitates rational social and individual responses to corruption.  ...  ACKNOWLEDGMENTS We would like to thank Professor Bjoern Hartmann for helpful discussion and advice, and Wei Wu for help in informing the design of the Bribecaster API, and a special thanks to Dinsha Mistree  ... 
doi:10.1145/2141512.2141570 dblp:conf/cscw/MittalWRMH12 fatcat:jjqqo5ivcrfxph3yrei22fbhli

TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis

Oluwatobi Fajana, Gareth Owenson, Mihaela Cocea
2018 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)  
In this paper, we introduce TorBot Stalker: the first mechanism for detecting, de-anonymizing, and destroying Tor botnets.  ...  We observed that Torbot Stalker is able to de-anonymize real botnets in the Tor network and further identify infected hosts and control servers.  ...  Another method uses traffic confirmation attacks where an attacker controls the entry guard to the hidden service as well as the entry guard to the host and can confirm similar timings.  ... 
doi:10.1109/nca.2018.8548313 dblp:conf/nca/FajanaOC18 fatcat:fxli4gnpazhmbek2o4cg5k3nqe

Probabilistic Prediction of Privacy Risks in User Search Histories

Joanna Biega, Ida Mele, Gerhard Weikum
2014 Proceedings of the First International Workshop on Privacy and Secuirty of Big Data - PSBD '14  
This paper proposes a new model of user-centric, global, probabilistic privacy, geared for today's challenges of helping users to manage their privacy-sensitive information across a wide variety of social  ...  We aim for a tool that simulates such a powerful adversary, predicts privacy risks, and guides the user. In this paper, our framework is specialized for the case of Internet search histories.  ...  In the age of big data and social media, guarding a user's privacy in a single dataset is way insufficient.  ... 
doi:10.1145/2663715.2669609 dblp:conf/cikm/BiegaMW14 fatcat:rgywu4lqhnh35fhnpwpjyv65nm

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings [article]

Martin Byrenheid, Stefanie Roos, Thorsten Strufe
2021 arXiv   pre-print
Since embeddings assign a unique integer vector to each node that encodes its position in a spanning tree of the overlay, attackers can infer network structure from knowledge about assigned vectors.  ...  In F2F overlay networks, using vectors of randomly chosen numbers for routing decreases the mean number of discovered individuals by one order of magnitude compared to the popular approach of using child  ...  Previous studies have shown that unknown individuals in a social graph can be de-anonymized by looking for nodes with similar structural properties in another, non-anonymous social graph [16, 20] obtained  ... 
arXiv:2108.04374v2 fatcat:fymm5wb6rvcvnkv435pzzjqqsm
« Previous Showing results 1 — 15 out of 2,835 results