Search results
Jump to navigation
Jump to search
- ...ear= 2012 |title= Control Centrality and Hierarchical Structure in Complex Networks |journal= PLOS ONE |volume= 7 |issue= 9 |pages= e44459 |doi= 10.1371/journ ...SIAM International Conference on Data Mining |chapter= Randomizing Social Networks: A Spectrum Preserving Approach |pages= 739–750 |year= 2008 |doi=10.1137/1 ...10 KB (1,431 words) - 03:10, 15 February 2025
- ...unconditional sender and recipient untraceability. Anonymous communication networks based on this problem are often referred to as '''DC-nets''' (where DC stan ...ity of practical DC-net implementations, at the potential risk of reducing anonymity if colluding participants can split the secret sharing graph into separate ...16 KB (2,357 words) - 18:15, 8 May 2024
- * [[Peer-to-peer|Peer-to-peer networks]] ...f NC systems to do a wide variety of routing optimizations in peer-to-peer networks. ...19 KB (2,693 words) - 12:59, 5 October 2024
- ...ack to the user.<ref name=":1" /> General privacy requirements include [[K-anonymity]], maximum area, and minimum area.<ref name=":12">{{cite journal |last1=Cho ...(computer scientist)|title=Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms |journal=IEEE Transactions on Mobile Computing ...55 KB (7,739 words) - 07:36, 21 December 2024
- ...=P. Jean-Jacques|date=2016-01-01|title=Decentralized Clearing in Financial Networks (RM/16/005-revised-)|journal=Research Memorandum |url=https://ideas.repec.o * '''[[Anonymity (social choice)|Anonymity]]''' (='''Symmetry''') means that the apportionment does not depend on the ...35 KB (5,378 words) - 08:28, 2 February 2025
- ...|author3=S. Josefsson |author4=SJD AB |author5=M. Baushke |author6=Juniper Networks, Inc. |date=February 2020}}</ref><ref>{{cite ietf |rfc=8709 |title=Ed25519 * [[Tor (anonymity network)|Tor]]<ref>{{cite web|url=https://gitweb.torproject.org/torspec.git ...21 KB (2,850 words) - 01:51, 13 February 2025
- ...ject to state or professional regulations, including restrictions on donor anonymity and the number of offspring that may be produced, and there may be other le ...ate herself, typically without medical supervision. This process preserves anonymity and enables a donor to produce sperm in the privacy of his own home. A dono ...104 KB (15,801 words) - 14:29, 8 February 2025
- ...ontext that have a strict space requirement, such as [[Bitcoin]] or [[Tor (anonymity network)|Tor]]. Tor's data cells must be less than 517 bytes in length, so ...arch 2014, researchers at the Chinese State Key Lab for Integrated Service Networks and Xidian University extended the security of the SIDH to a form of digita ...25 KB (3,825 words) - 01:30, 30 December 2023
- ...s, [[radio-frequency identification]] (RFID) readers and [[wireless sensor networks]].<ref>{{cite web |author= Hellerstein, Joe |title= Parallel Programming in ...testing the fault tolerance of MapReduce frameworks | publisher= Computer Networks | year= 2015 | access-date= 13 April 2016 | archive-date= 22 July 2016 | ar ...160 KB (20,974 words) - 20:46, 18 February 2025