Spelling suggestions: "subject:"anonymity"" "subject:"synonymity""
11 |
Decentralizovaný komunikační nástroj s garancí anonymity / Decentralized communication tool with anonymity guaranteeLegéň, Michal January 2010 (has links)
Anonymity on the internet is becoming a actuall issue nowadays. There are several tools, that can be used to monitor user's activity and it can lead to lose privacy of users. The aim of this master's thesis is to describe different ways of working anonymous systems, especially the method called Onion Routing. The introduction of this work is devoted to the description of this method together with asymmetric cryptosystem RSA. The second part belongs to basics of socket programming and to the implementation of anonymous system in programming language C++. The final part is focussed on analysis of system in terms of security and time complexity. The conditions of anonymity and decentralization are accomplished. There is no presence of central server in the system and the management is handled by signalling messages.
|
12 |
The Role of Surveyor-Perceived Anonymity within Social Network SitesPeterson, Ashley M. 16 August 2012 (has links)
No description available.
|
13 |
The protection of children's identities in the criminal justice system: an analysis on section 154(3) of the Criminal Procedure Act 51 of 1977Letsoalo, Lisbeth Ledile January 2019 (has links)
Thesis ( LLM.) --University of Limpopo, 2019 / The Constitution of the Republic of South Africa, 1996 provides that a child’s best interests should be of primary consideration in any matter concerning him or her. Contrary to this value, and thereby excluding protection of child victims, section 154(3) of the Criminal Procedure Act 51 of 1977 simply focusses on anonymity protection of child offenders and witness involved in criminal proceedings. It currently expressly prohibits the publication of the identities of child offenders and witnesses when the media makes publications on the relevant criminal proceedings. However, this protection terminates once such child offenders and witnesses attain majority, therefore arbitrarily stripping them of the identity protection. As a result, media houses are not only at liberty to publish on criminal proceedings identifying child victims, but also to expose the identities of child offenders and witnesses upon attaining majority. Such publications have proved to impede on children’s rights, as well as to contribute to the psychological challenges faced by the children whenever they are exposed to the criminal justice system. In this study the constitutional validity of section 154(3) is investigated and it is argued that it is unconstitutional in all respects. The section contradicts the specific right afforded to all children in the Bill of Rights, as well as other ancillary rights, which ought to ensure the progressive realisation of the protection afforded in terms of section 154(3). It is recommended, firstly, that section 154(3) be declared unconstitutional, and be amended to include child victims within the ambit of its protection. Secondly, the protection should extend beyond the age of 18, in respect of all children involved in criminal proceedings. / National Research Foundation
|
14 |
Anonymity and time in public-key encryptionQuaglia, Elizabeth January 2012 (has links)
In a world that is increasingly relying on digital technologies, the ability to securely communicate and distribute information is of crucial importance. Cryptography plays a key role in this context and the research presented in this thesis focuses on developing cryptographic primitives whose properties address more closely the needs of users. We start by considering the notion of robustness in public-key encryption, a property which models the idea that a ciphertext should not decrypt to a valid mes- sage under two different keys. In contexts where anonymity is relevant, robustness is likely to be needed as well, since a user cannot tell from the ciphertext if it is intended for him or not. We develop and study new notions of robustness, relating them to one another and showing how to achieve them. We then consider the important issue of protecting users' privacy in broadcast encryption. Broadcast encryption (BE) is a cryptographic primitive designed to efficiently broadcast an encrypted message to a target set of users that can decrypt it. Its extensive real-life application to radio, television and web-casting renders BE an extremely interesting area. However, all the work so far has striven for efficiency, focusing in particular on solutions which achieve short ciphertexts, while very little attention has been given to anonymity. To address this issue, we formally define anonymous broadcast encryption, which guarantees recipient-anonymity, and we provide generic constructions to achieve it from public-key, identity-based and attribute-based encryption. Furthermore, we present techniques to improve the efficiency of our constructions. Finally, we develop a new primitive, called time-specific encryption (TSE), which allows us to include the important element of time in the encryption and decryption processes. In TSE, the sender is able to specify during what time interval a ciphertext can be decrypted by a receiver. This is a relevant property since information may become useless after a certain point, sensitive data may not be released before a particular time, or we may wish to enable access to information for only a limited period. We define security models for various flavours of TSE and provide efficient instantiations for all of them. These results represent our efforts in developing public-key encryption schemes with enhanced properties, whilst maintaining the delicate balance between security and efficiency.
|
15 |
Anonymita akcionářů a podmínky jejich identifikace / Anonymous shareholders and conditions for their identificationVařbuchta, Marek January 2014 (has links)
The anonymity of shareholders and non-transparent ownership structures of joint stock companies belongs to the most discussed issues of these days in terms of corporate law. The significant changes in relevant legislation and unresolved questions of the anonymity of shareholders are the reason I decided to focus on this topic. The main purpose of my thesis is to analyze the anonymity of shareholders and conditions of their identification, primarily regarding the recent recodification of the Czech civil law and the legislation being prepared not only in the Czech Republic but also at EU-level. The thesis is composed of six chapters. Chapter One is introductory and deals with the history of the anonymity of shareholders and their identification within the Czech territory. Chapter two is concerned with the problems that resulted from enacting the Bearer Share Abolition Act. Next two Chapters concentrate on current Czech legislation regulating the anonymity of shareholders and conditions of their identification, represented in particular by the Business Corporation Act and other relevant statues. These chapters are subdivided into several parts which thematically deal with the anonymity based on the form of shares, information publicized in the Commercial Register or the conception of a trust; it also...
|
16 |
Anonymita akcionářů a podmínky jejich identifikace / Anonymity of shareholders and requirements for their identificationKulhánková, Klára January 2012 (has links)
This thesis deals with degree of effective anonymity of shareholders in a public limited company and with possible ways of its limiting. It is also concerned with manners of identification of shareholders for purpose of exercise of their shareholder rights, as well as for uncovering shareholder structure of a public limited company is specific cases, provided by law. The aim of the thesis is to explain and analyze the legislation de lege lata, particularly with regards to recodification of private law and to other upcoming enactments of both private and public law. The topic was chosen by the author also with intent to professionally explain this issue which has not been dealt with comprehensively in academic papers. The topic has been elaborated particularly by analyzing individual legal concepts relating to anonymity and identification of shareholders; a historical method is used in the introduction dedicated to historical roots of anonymity of shareholders, too. The introduction contains characteristics of public limited company, including definition of shares, and sets the traditional concept of shareholder's anonymity in the historical context. The main part of the thesis is focused on analysis of individual provisions of the Commercial Code from the perspective of degree of shareholder's...
|
17 |
Off the edgeStoneham, Luke January 2014 (has links)
Work which takes from elsewhere forms an important thread in European art music. There is a long tradition of music which variously borrows, thieves, pastiches, plagiarises, ironically ‘retakes’, hoaxes, impersonates and appropriates. The music I have written for Off the edge, while seeking to honour and add to this thread, also attempts to zoom in upon and make explicit the idea of an ultimate and irreversible composerly self-annihilation, a kind of one-way exit-gate from the world of authored musical works itself made of pieces of music, which so much of this tradition, I feel, points towards. (Of my nine pieces, it is perhaps Time to go—only, with its ‘à la suicide note’ texts and its music that seems to slide in from far beyond the frame that is ‘composer Luke Stoneham’, which manages to get closest to this.) I have chosen the title Off the edge, because all of my music tries to capture a sense of nocturnal peripheral vision: be content with catching glimpses of the composer Luke Stoneham, because as soon as you turn to look at him face-on, he disappears.
|
18 |
This Is Why We Can't Have Nice Things: The Origins, Evolution and Cultural Embeddedness of Online TrollingPhillips, Whitney, Phillips, Whitney January 2012 (has links)
Ethnographic in approach, this dissertation examines trolling, an online subculture devoted to meme creation and social disruption. Rather than framing trolling behaviors as fundamentally aberrant, I argue that trolls are agents of cultural digestion; they scour the landscape, repurpose the most exploitable material, then shove the resulting monstrosities into the faces of an unsuspecting populace.
Within the political and social context of the United States, the region to which I have restricted my focus, I argue that trolls on 4chan/b/ and Facebook perform a grotesque pantomime of a number of pervasive cultural logics, including masculine domination and white privilege. Additionally, I argue that the rhetorical and behavioral tactics used by trolls, including sensationalism, spectacle, and emotional exploitation, are homologous to tactics routinely deployed by American corporate media outlets. In short, trolling operates within existing systems, not in contrast to them, immediately complicating knee-jerk condemnations of trolling behaviors. / 10000-01-01
|
19 |
Overcoming Anonymity: The Use of Autobiography in the Works Of Jane Austen and Charlotte BronteScalpato, Lauren Ann January 2004 (has links)
Thesis advisor: Susan Michalczyk / In nineteenth-century England, women were struggling to find an outlet for the intelligence, emotions, and creativity that the patriarchal society around them continuously stifled. For women such as Jane Austen and Charlotte Brontë, writing served as an opportunity to defy restrictive social structures and offered a needed public voice. By expressing their own thoughts and frustrations, Austen and Brontë helped to overcome the anonymity imposed upon women of their time, as they illuminated the female experience. The following paper takes a look at the ways in which Austen and Brontë imparted autobiographical elements to their female characters, as both authors underwent important catharses and inspired the women around them. To this day, their literature provides critical insight into the troubled existence of the nineteenth-century woman, while revealing their own struggles with their constricted identities. / Thesis (BA) — Boston College, 2004. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: English. / Discipline: College Honors Program.
|
20 |
Anonymous Multi-Receiver Identity-Based EncryptionHuang, Ling-Ying 31 July 2007 (has links)
Recently, many multi-receiver identity-based encryption schemes have been proposed in the literature. However, none can protect the privacy of message receivers among these schemes. In this thesis, we present an anonymous multi-receiver identity-based encryption scheme where we adopt Lagrange interpolating polynomial mechanisms to cope with the above problem. Our scheme makes it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed. Furthermore, the proposed scheme is quite receiver efficient since each of the receivers merely needs to perform constant times (twice in fact) of pairing computation, which is the most time-consuming computation in pairing-based cryptosystems, to decrypt the received message. Furthermore, we prove that our scheme is secure against
adaptive chosen plaintext attacks and adaptive chosen ciphertext attacks. Finally, we also prove that the receivers of the scheme can be anonymous.
|
Page generated in 0.0381 seconds