A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Pisces: Anonymous Communication Using Social Networks
[article]
2012
arXiv
pre-print
In this paper, we propose Pisces, a decentralized protocol for anonymous communications that leverages users' social links to build circuits for onion routing. ...
In Pisces, we discover peers by using random walks in the social network graph with a bias away from highly connected nodes to prevent a few nodes from dominating the circuit creation process. ...
Finally, using real world social network topologies, we show that Pisces provides significantly higher anonymity than existing approaches. ...
arXiv:1208.6326v1
fatcat:p3vugpynjbc5resjeixc6vhpbe
The transatlantic introduction of weakfish Cynoscion regalis (Bloch & Schneider, 1801) (Sciaenidae, Pisces) into Europe
2016
BioInvasions Records
Moreover, they are not used in European aquaculture facilities, nor in the aquarium trade. ...
We also thank three anonymous reviewers, CW Martin and JM Hanson for their suggestions on how to improve the initial versions of this paper. ...
Acknowledgements We thank A Fernandes and J Estica for giving us the first specimen of weakfish collected in the Guadiana estuary and J Babaluk for proof-reading the paper. ...
doi:10.3391/bir.2016.5.4.11
fatcat:vgxxirsxyrbvhaesnmcz6fkcm4
SGor: Trust graph based onion routing
2013
Computer Networks
We evaluate SGor with simulation-based experiments using several real-world social trust datasets. ...
The experimental results confirm that SGor can mitigate key limitations in the use of trust for protecting anonymity but introduces only a few overheads. ...
For example, if we derive a trust graph from an online social network and apply it to SGor, the members of this online social network can use SGor to protect their anonymity when they visit Internet services ...
doi:10.1016/j.comnet.2013.08.005
fatcat:xg4skkurqbaw5iphds5ebnkw2i
SmartWalk
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
We experimentally demonstrate the applicability of adaptive random walks on a number of social network based security and privacy systems, including Sybil defenses, anonymous communication and link privacy ...
Currently, the design of such social security mechanisms is limited to the classical paradigm of using fixed-length random walks for all nodes on a social graph. ...
The Pisces protocol [34] is a low-latency anonymity system that leverages social links. ...
doi:10.1145/2976749.2978319
dblp:conf/ccs/LiuJM16
fatcat:gumslqzrxzalpgq7mfp4cadbju
On Privacy and Anonymity in Freenet System
2016
International Journal of Security and Its Applications
So it's widely used in different fields. ...
As a typical representative of anonymous network applications, Freenet system has so many advantages in sharing, privacy, anonymity as well as uploading and downloading convenience that it adequately realizes ...
Natural Science Found ation of China under Grant No.61170273; 2010 Information Security Program of China N ational Development and Reform Commission with the title "Testing Usability and Securi ty of Network ...
doi:10.14257/ijsia.2016.10.5.04
fatcat:k6uwi5x52jho3otlc6bowdnmum
LinkMirage: How to Anonymize Links in Dynamic Social Systems
[article]
2016
arXiv
pre-print
First, we propose LinkMirage, a community detection based algorithm for anonymizing links in social network topologies; LinkMirage preserves community structures in the social topology while anonymizing ...
Social network based trust relationships present a critical foundation for designing trustworthy systems, such as Sybil defenses, secure routing, and anonymous/censorshipresilient communications. ...
For instance, Tor operators [11] (or other anonymous communication network such as Pisces in [30] ) can leverage the perturbed social relationships to set up the anonymous circuit; 2) Local access to ...
arXiv:1501.01361v2
fatcat:dgztft5hjnh6lds4hkwq5m3sma
To Be or Not to Be: Social Justice in Networked Learning
2019
Education Sciences
This article aims to expand the current understandings of social justice in networked learning practices by challenging the ways in which online subjectivities are conceptualised in communal settings. ...
justice are to be made in networked learning. ...
In this sense, social absence is not an attempt to refashion anonymity with a new outlook. ...
doi:10.3390/educsci9040261
fatcat:2je2oy4mezbdtf6zirxhos3cbu
VirtualFriendship: Hiding interactions on Online Social Networks
2014
2014 IEEE Conference on Communications and Network Security
The enormous popularity of Online Social Networks (OSNs) dramatically changed the way people communicate and interact with each other. ...
In fact, OSN providers can directly access a big amount of information about users and infer further information when using data mining techniques (e.g., about the on line interactions among two users) ...
Usually, anonymous networks, such as Tor [19] , are used as the solution to hide identity of the communication and achieve anonymity. ...
doi:10.1109/cns.2014.6997501
dblp:conf/cns/BeatoCPV14
fatcat:t7c3bnu2hbaexobjwnqtxgbfki
Privacy Information Security Classification for Internet of Things Based on Internet Data
2015
International Journal of Distributed Sensor Networks
This paper focuses on studying the attributes of the privacy and proposes privacy information security classification (PISC) model. ...
The privacy is classified into four security classifications by PISC, and each classification has its security goal, respectively. ...
Related Work Facebook is the largest social network website, where people can share their photos and personal information. In Facebook, a photo can be set in different privacy levels [15] . ...
doi:10.1155/2015/932941
fatcat:ihrpzfcd5fdgbpsdzpzswccvpi
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
2017
Proceedings on Privacy Enhancing Technologies
A number of systems implement social-based communication to resist Sybil attacks. For instance Drac [44] and Pisces [108] use social-networks to support routing of messages. ...
Systems may use the underlying social trust structure to build overlay privacy-friendly social network services, as surveyed by Paul et al. [120] . ...
doi:10.1515/popets-2017-0056
dblp:journals/popets/TroncosoIDH17
fatcat:uole5gkxeravhful25scijakpa
Big Data and Knowledge Extraction for Cyber-Physical Systems
2015
International Journal of Distributed Sensor Networks
It is also an honor for us to serve as the Guest Editors of this issue.
Xiuzhen Cheng Yunchuan Sun Antonio Jara Houbing Song Yingjie Tian ...
We are indebted to the journal editors and all anonymous reviewers for their hard work that helps the authors further enhance the quality of the manuscripts. ...
as vehicles are required to adjust their communication ranges according to the network density in order to avert the interference among them. ...
doi:10.1155/2015/231527
fatcat:qsobptejnfbrteagyzr2xkebea
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
2016
IET Information Security
Online social network (OSN) users are exhibiting an increased privacyprotective behaviour specially since multimedia sharing has emerged as a popular activity over most OSN sites. ...
User attributes are then used as predicate values. ...
Furthermore, system called Gossple in [17] associates every OSN user with a set of anonymous acquaintances who share common interests, whereas Pisces presented in [18] anonymizes communications, most ...
doi:10.1049/iet-ifs.2014.0466
fatcat:y7sbuolyrjgd5gedti5sgtkqxm
Data Sharing in DHT Based P2P Systems
[chapter]
2009
Lecture Notes in Computer Science
P2P systems are the chosen platform for new style of applications where distributed data can be shared massively e.g., social networks [62], geo-collaboration systems [42], professional communities (medical ...
Introduction Peer-to-peer (P2P) systems take advantage of advances in networking and communication for providing environments where heterogeneous peers with high autonomy compose a system with a fully ...
They use a self-organizing overlay network on top of the physical network. ...
doi:10.1007/978-3-642-03722-1_13
fatcat:xpziojr4wvd3dkev5jj4a4id4a
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation
2016
Proceedings on Privacy Enhancing Technologies
Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. ...
To alleviate this, we propose an anonymous peer-assisted CDN (APAC), which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request) and responder anonymity ...
R-252-000-560-112 and the National Science Foundation of US under Grant No. CNS-1318872. All opinions expressed in this work are solely those of the authors. ...
doi:10.1515/popets-2016-0041
dblp:journals/popets/JiaBSL16
fatcat:7npzlglfw5dylecsb5w6nke3ia
Big Data and Individual Privacy in the Age of the Internet of Things
2017
Technology Innovation Management Review
Out of the cave, the tribal teepee, the pueblo, the community fortress, man emerged to build himself a house of his own with a shelter in it for himself and his diversions. Every age has seen it so. ...
Given the wide use of social media and networking sites, it was inevitable that a large data breach would occur. ...
Big data may expose a person's behavioural patterns (websites visited, pages clicked, etc.) on their social networking site. ...
doi:10.22215/timreview1067
fatcat:rwzuftbvafc6pjppvhjt56b6gu
« Previous
Showing results 1 — 15 out of 252 results