161 |
Privacy in Bitcoin through decentralized mixersCoutu, Olivier 04 1900 (has links)
Dans les crypto-monnaies telles Bitcoin, l’anonymité des utilisateurs peut être compromise de plusieurs façons. Dans ce mémoire, nous effectuons une revue de littérature et une classification des différents protocoles existants pour anonymiser les usagers et analysons leur efficacité. S’appuyant sur certains critères désirables dans de tels protocoles, nous proposons un modèle de mixeur synchrone décentralisé. Nous avons ciblé deux approches qui s’inscrivent dans ce modèle, le plan de transaction et le réseau de transactions, le second étant une contribution originale de ce mémoire. Nous expliquons son fonctionnement puis analysons son efficacité dans le contexte actuel d’utilisation de Bitcoin / In cryptocurrencies such as Bitcoin, the anonymity of the users may be compromised
in many ways. In this thesis, we review the literature concerning existing protocols used
to increase anonymity by a method called mixing and produce a classification for such
protocols. We propose a decentralized synchronous N-to-N mixing model that takes into
account many considerations of mixers. We address two frameworks within this model,
the transaction blueprint and the network of transactions, the second approach being a
new contribution. We explain how it functions and analyse its efficiency in the current
Bitcoin ecosystem.
|
162 |
Úprava obrazu a zvuku ve zpravodajství s cílem znesnadnění identifikace osob (na příkladu hlavních zpravodajských relací České televize, TV Nova a FTV Prima) / Adjusting the television picture and sound in newscast to make it more difficult to identify people (newscast of Česká televize, TV Nova and FTV Prima)Sváček, Martin January 2016 (has links)
The Diploma Thesis deals - within its theoretical part - with situations in TV news, which require conversion of audiovisual content to achieve involved person's anonymity. Ethics codes of analysed television stations are major factor in this part, also included as secondary support relavant studies, reference books, laws and edicts. Conversion of audiovisual content is necessary - speaking of victims of crime (mainly violent or sexual offense) and theirs relatives, children, suspects and theirs relatives, anonymous sources, some criminalists or other vulnerable persons. Practical part of the thesis applies gained informations to analyse audio-visual recordings - broadcasted by Czech TV (Česká televize), TV Nova and FTV Prima. Study reflected diffrences between conversion of same situations and same persons. Study also reflected some ethically controversial moments. Several reporters gived an interview to comment selected news.
|
163 |
Essays on dynamic social influence / Essais sur l’influence sociale dynamiqueFörster, Manuel 10 June 2014 (has links)
Cette dissertation de doctorat développe des théories de l'influence sociale dynamique. Dans un cadre dynamique, les individus interagissent à plusieurs reprises avec leur environnement social et échangent leurs croyances et opinions sur différentes questions économiques, politiques et sociales. Dans le Chapitre 2, nous étudions les processus d'influence modélisés par les moyennes ordonnées pondérées. Ces dernières sont anonymes : elles ne dépendent que du nombre d'agents qui partagent la même croyance. Nous exhibons une condition nécessaire et suffisante pour la convergence au consensus et caractérisons les résultats où la société se retrouve polarisée. Enfin, nous appliquons nos résultats aux quantificateurs linguistiques flous. Dans le Chapitre 3, nous introduisons la possibilité de manipulation dans le modèle de DeGroot (1974). Nous montrons que la manipulation peut modifier la structure de confiance et mène à une société connectée. La manipulation promeut le leadership d'opinion, mais même l'agent manipulé peut gagner de l'influence sur les croyances à long terme. Finalement, nous étudions la tension entre l'agrégation d'informations et le déploiement de désinformations. Dans le Chapitre 4, nous introduisons des conflits d'intérêt dans un modèle de dynamique de croyance non-bayésienne. Les agents se rencontrent avec leurs voisins dans le réseau social et échangent des informations stratégiquement. Avec des conflits d'intérêt, la dynamique de croyance ne converge pas en général: la croyance de chaque agent converge vers un certain intervalle et continue à fluctuer sur celui-ci pour toujours. / This Ph.D. dissertation develops theories of dynamic social influence. In a dynamic framework, individuals internet repeatedly with their social environment and exchange beliefs and opinions on various economic, political and social issues. In Chapter 2, we study influence processes modeled by ordered weighted averaging operators. These operators an anonymous: they only depend on how many agents share a belief. We find a necessary and sufficient condition for convergence to consensus and characterize outcomes where the society ends up polarized. Furthermore, we apply our results to fuzzy linguistic quantifiers. ln Chapter 3, we introduce the possibility of manipulation into the model by DeGroot (1974). We show that manipulation can modify the trust structure and lead to a connected society. Manipulation fosters opinion leadership, but the manipulated agent may even gain influence on the long-run beliefs. Finally, we investigate the tension between information aggregation and spread of misinformation. In Chapter 4, we introduce conflicting interests into a model of non-Bayesian belief dynamics. Agents meet with their neighbors in the social network and exchange information strategically. With conflicting interests, the belief dynamics typically fails to converge: each agent's belief converges to some interval and keeps fluctuating on it forever.
|
164 |
« Qui est là ? » ˸ enquête sur l’identification et l’identité des personnages anonymes dans le théâtre de William Shakespeare / “Who’s there?” ˸ a Study of the Identification and the Identity of Anonymous Characters in William Shakespeare’s PlaysLittardi, Oriane 25 January 2019 (has links)
Dans les pièces de William Shakespeare, les personnages sont souvent désignés par un nom commun, qui peut indiquer leur statut social (« Le Gentilhomme »), leur métier (« Le Jardinier »), leur origine géographique (« L’Égyptien ») ou encore leurs liens relationnels (« Le Père »). Ces désignations anonymes, c’est-à-dire qui n’attribuent pas de nom propre aux personnages, montrent que Shakespeare favorise une inscription de ces rôles dans une société hiérarchisée et étendue, à l’image du public qui assiste aux spectacles, lui-même composé d’un large spectre social. L’étude de leur identité formelle, à partir de tous les signes identificatoires qui permettent la fabrique des personnages — didascalies, costumes, accessoires, corps et parole —, confirme une conception des personnages anonymes ancrée dans l’identité sociale, au détriment de leur identité personnelle. La généricité du personnage anonyme lui permet alors le plus souvent de se mettre au service des héros nommés ou du groupe social auquel il appartient, suivant le principe de self-effacement, « effacement de soi », pour reprendre les termes de Molly Mahood et de Florence Yoon. Toutefois, le mouvement poétique de Shakespeare le conduit parfois à développer ces rôles qui semblent au premier abord mineurs, en travaillant une tension entre fonctionnalisation et individualisation. Leur rapport à l’altérité leur confère alors une identité interactive, socialement et théâtralement, qui façonne leur raison d’être sur la scène de théâtre. D’un anonymat générique, les personnages peuvent alors s’élever vers la sphère de l’universalité. / In William Shakespeare’s plays, characters are often called by common nouns, which can indicate social status (“Gentleman”), occupation (“Gardener”), geographic origin (“Egyptian”) or relationship (“Father”). This anonymous way of naming, which does not assign personal names to the characters, shows that Shakespeare stresses these parts’ affiliation to a ranked and extensive society, mirroring the audience attending the performance, which itself forms a large social spectrum. The study of their identification, based on all the signs which shape the characters — speech headings, costume, props, body, speech —, reasserts a conception of anonymous characters which highlights their social identity to the detriment of their personal identity. Thus, the genericity of the anonymous characters mainly allow them to support named heroes or their social group, according to the self-effacement principle, as Molly Mahood and Florence Yoon define it. However, Shakespeare’s poetical process leads him to develop parts, that may seem minor at first, by working the tension between their function and their individuality. Their relation to otherness gives them an interactive identity, socially and theatrically, which shapes their raison d’être. From generical anonymity, characters can thus rise up to the realm of universality.
|
165 |
Reprodução humana assistida e biopoder: discursos entre a biologização e a socioafetividade no direito das famílias contemporâneoAgostini, Daniel 29 February 2016 (has links)
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2016-05-23T16:31:17Z
No. of bitstreams: 1
Daniel Agostini_.pdf: 1034713 bytes, checksum: 17d486b0a13c571c764066c4c881ef7f (MD5) / Made available in DSpace on 2016-05-23T16:31:17Z (GMT). No. of bitstreams: 1
Daniel Agostini_.pdf: 1034713 bytes, checksum: 17d486b0a13c571c764066c4c881ef7f (MD5)
Previous issue date: 2016-02-29 / Nenhuma / Considerando os impactos das novas tecnologias de reprodução humana assistida (RHA) no campo do Direito das Famílias Contemporâneo, o presente trabalho tem como objetivo geral analisar em que medida o acesso a elas pode consistir em um fator de valorização dos vínculos familiares biológicos em detrimento dos vínculos socioafetivos, analisando as práticas discursivas e os argumentos presentes no debate em torno do anonimato ou conhecimento do doador de gametas. O tema despertou especial atenção por, à primeira vista, verificar-se uma biologização na substituição do paradigma do anonimato para o paradigma do conhecimento do doador, ao passo que se percebe no Direito uma prevalência para as relações afetivas. Foram analisadas as normativas ético-médicas do Conselho Federal de Medicina, representadas especialmente pela Resolução nº 2013, que prevê o anonimato, e projetos de lei do Congresso Nacional do Brasil, Projeto de Lei do Senado nº 1.184, de 2003, e seus apensos, tendo como pano de fundo discutir as transformações e diversas concepções de família e parentesco, que passa de um modelo patriarcal fechado e de prole consanguínea, para modelos plurais fundados em laços afetivos. Empregou-se como referencial teórico de base a análise de discurso, abordagem qualitativa e dialética, sobre documentação direta e indireta, analisando-se o texto legal, debates, votos e pareceres existentes, com sistematização das conclusões. Conclui-se que o debate político brasileiro, embora esteja inserido nas formações discursivas correlatas da questão (ciência, religião, filosofia e juridicidade), possui fragilidade argumentativa-epistemológica e é permeado por subjetivismos, interesses pessoais e político-partidários, além de sofrer forte influência midiática, não adentrando de forma mais objetiva e fundamentada nas diversas implicações de um ou outro paradigma. A opção pelo conhecimento do doador parece possuir caráter biologizante do indivíduo, mas não da relação entre os indivíduos. Se é verdade que, na contemporaneidade, como afirma Marilyn Strathern, o corpo mantém a pessoa enquanto partícula tão indivisa que torna os relacionamentos algo abstratos e fora dela, isso se coaduna com disposições internacionais de que o gene constitui o homem biologicamente, mas não é tudo o que ele é. Dito de outra maneira, o moderno conhecimento do corpo humano e a evolução da ciência vista na exacerbação das técnicas de RHA, aprofundaram uma noção de desvinculação do corpo do espírito e, com isso, da autonomia das relações entre as pessoas, levando-se à percepção de que o doador de gametas representa nada mais que um doador de material biológico e ‘ascendente estritamente biológico’ porque a noção de parentesco é relacional, feita com conexões cultural e individualmente significadas, de forma que o desvelamento genético do homem oferece uma escolha: as pessoas podem estabelecer conexões ativas por conta da genética ou podem, justamente, se desconectar, apesar dela. No Brasil, embora não se aprofundem essas discussões de forma mais sofisticada, percebe-se essa separação, aliada ao caráter biologizante do indivíduo, com desvinculação das relações formadas entre estes. / Considering the impact of new assisted human reproductive technologies (RHA) in the field of Law of Contemporary Families, this work has as main objective to analyze to what extent access to them may consist of a factor of appreciation of biological family ties to the detriment of social-affective ties, analyzing the discursive practices and the arguments present in the debate on anonymity or knowledge of the gamete donor. The issue aroused special attention at first glance, check it a biologization the replacement of anonymity paradigm for the giver of knowledge paradigm, while it is perceived in the law a prevalence for affective relationships. We analyzed the ethical-medical regulations of the Brazil Federal Council of Medicine, especially represented by Resolution No. 2013, which provides anonymity, and the National Congress bills in Brazil, Senate Bill No. 1184, 2003, and its accompanying, having as a backdrop to discuss the changes and different conceptions of family and kinship, passing a patriarchal model closed and inbred offspring to plural models based on emotional ties. He was employed as the basis of theoretical discourse analysis, qualitative and dialectical approach on direct and indirect documentation, analyzing the legal text, debates, existing votes and opinions, with systematization of the findings. We conclude that the Brazilian political debate, even though it is inserted in the related discursive formations of the issue (science, religion, philosophy and legality), has argumentative and epistemological fragility and is permeated by subjectivism, personal interests and political partisanship, in addition to suffering strong influence media, not entering in a more objective and reasoned manner in the various implications of a paradigm or the other. The choice of the donor's knowledge seems to have biologizing character of the individual, but not the relationship between individuals. If it is true that, in contemporary times, as stated by Marilyn Strathern, the body keeps a person as particle so indivisible that makes relationships something abstract and beyond, it is consistent with international provisions that the gene is the man biologically, but not all he is. In other words, the modern knowledge of the human body and the evolution of view science in exacerbation of AHR techniques, deepened a sense of disconnection from the spirit body, and with it, the autonomy of relations between people, leading to the perception that the gamete donor is nothing more than a biological material donor and 'up strictly biological' because kinship notion is relational, made with cultural connections and individually meant, so that the genetic man unveiling offers a choice: people can establish active connections due to genetic or can precisely disconnect despite it. In Brazil, although it does not deepen these discussions in a more sophisticated way, we perceive this separation, coupled with biologizing character of the individual, with untying the relationships formed between them.
|
166 |
Mulheres em luta: uma outra história do Movimento "Queixadas" de PerusAlves, Maria Madalena Ferreira 07 June 2011 (has links)
Made available in DSpace on 2016-04-25T19:20:15Z (GMT). No. of bitstreams: 1
Maria Madalena Ferreira Alves.pdf: 3900617 bytes, checksum: 3d2b7cf605cc7229be6e856c17aa68b6 (MD5)
Previous issue date: 2011-06-07 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / This dissertation, Women in struggle: another point of view about Perus Queixadas‟ Movement , is the result of a research about the Cement Factory workers strike which has happened in Perus whereabouts in Sao Paulo suburbs. The aim of this work was to show the women participation in this movement. The women mentioned in this work are not workers neither feminists, they are wives, they are housewives that experienced their husbands seven years strike consequences. They were required to take the family responsibility and, at the same time, to participate in pickets and in another events in the workers movement favor, in many cases. One can say that the struggle kept going on through ecological claims in defending environment (against the air pollution caused by the factory cement thrown in air) when the strike was over. The objective is to provide visibility to these ladies act and to contribute with a different point of view about women which goes beyond the common-sense normally given to them a fragile being that hides their organization and struggle capability that was unveiled when their families were threatened. The research has been conducted using different traditional data gathering tools: interviews, focus group, historical documents and testimonials / Esta dissertação, Mulheres em luta: uma outra história do movimento Queixadas‟ de Perus , é resultado da pesquisa realizada na região de Perus, periferia da cidade de São Paulo, sobre a greve dos operários da Fábrica de Cimento. O objetivo foi mostrar a participação das mulheres neste movimento. As mulheres citadas no trabalho não são operárias nem feministas, são donas de casa e esposas que viveram as conseqüências da greve de 07 anos promovida por seus maridos. Em muitos casos, elas foram como que obrigadas a assumir a responsabilidade da família e, ao mesmo tempo, participar dos piquetes e de outros eventos em favor do movimento operário. Pode-se dizer, inclusive, que terminada a greve a luta continuou nas reivindicações de caráter ecológico, em defesa ao meio ambiente (contra a poluição atmosférica promovida pela fábrica ao lançar o pó de cimento diretamente na atmosfera). Ao abordar este tema, o objetivo é dar visibilidade à atuação destas senhoras e contribuir com uma visão com relação às mulheres que ultrapasse os lugares-comuns atribuídos a elas, com uma concepção de natureza frágil, escondendo sua capacidade de organização e luta a qual se revelou em Perus quando a vida da família foi ameaçada. A pesquisa com as mulheres utilizou diversos instrumentos de coleta de dados: entrevistas, grupo focal, documentos históricos e relatos
|
167 |
Nymbler: Privacy-enhanced Protection from Abuses of AnonymityHenry, Ryan January 2010 (has links)
Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet---such as websites, IRC networks and mail servers---allow anonymous access while protecting themselves against abuse by misbehaving anonymous users?
Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design.
The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework---a nimbler version of Nymble---called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users. We also propose a set of performance requirements that anonymous blacklisting systems should meet to maximize their potential for real-world adoption, and formally define some optional features in the anonymous blacklisting systems literature.
We then present Nymbler, which improves on existing Nymble-like systems by reducing the level of trust placed in third parties, while simultaneously providing stronger privacy guarantees and some new functionality. It avoids dependence on trusted hardware and unreasonable assumptions about non-collusion between trusted third parties. We have implemented all key components of Nymbler, and our measurements indicate that the system is highly practical. Our system solves several open problems in the anonymous blacklisting systems literature, and makes use of some new cryptographic constructions that are likely to be of independent theoretical interest.
|
168 |
Efficient Packet-Drop Thwarting and User-Privacy Preserving Protocols for Multi-hop Wireless NetworksMahmoud, Mohamed Mohamed Elsalih Abdelsalam 08 April 2011 (has links)
In multi-hop wireless network (MWN), the mobile nodes relay others’ packets for enabling new applications and enhancing the network deployment and performance. However, the selfish nodes drop the packets because packet relay consumes their resources without benefits, and the malicious nodes drop the packets to launch Denial-of-Service attacks. Packet drop attacks adversely degrade the network fairness and performance in terms of throughput, delay, and packet delivery ratio. Moreover, due to the nature of wireless transmission and multi-hop packet relay, the attackers can analyze the network traffic in undetectable way to learn the users’ locations in number of hops and their communication activities causing a serious threat to the users’ privacy. In this thesis, we propose efficient security protocols for thwarting packet drop attacks and preserving users’ privacy in multi-hop wireless networks.
First, we design a fair and efficient cooperation incentive protocol to stimulate the selfish nodes to relay others’ packets. The source and the destination nodes pay credits (or micropayment) to the intermediate nodes for relaying their packets. In addition to cooperation stimulation, the incentive protocol enforces fairness by rewarding credits to compensate the nodes for the consumed resources in relaying others’ packets. The protocol also discourages launching Resource-Exhaustion attacks by sending bogus packets to exhaust the intermediate nodes’ resources because the nodes pay for relaying their packets.
For fair charging policy, both the source and the destination nodes are charged when the two nodes benefit from the communication. Since micropayment protocols have been originally proposed for web-based applications, we propose a practical payment model specifically designed for MWNs to consider the significant differences between web-based applications and cooperation stimulation. Although the non-repudiation property of the public-key cryptography is essential for securing the incentive protocol, the public-key cryptography requires too complicated computations and has a long signature tag. For efficient implementation, we use the public-key cryptography only for the first packet in a series and use the efficient hashing operations for the next packets, so that the overhead of the packet series converges to that of the hashing operations. Since a trusted party is not involved in the communication sessions, the nodes usually submit undeniable digital receipts (proofs of packet relay) to a centralized trusted party for updating their credit accounts. Instead of submitting large-size payment receipts, the nodes submit brief reports containing the alleged charges and rewards and store undeniable security evidences. The payment of the fair reports can be cleared with almost no processing overhead. For the cheating reports, the evidences are requested to identify and evict the cheating nodes. Since the cheating actions are exceptional, the proposed protocol can significantly reduce the required bandwidth and energy for submitting the payment data and clear the payment with almost no processing overhead while achieving the same security strength as the receipt-based protocols.
Second, the payment reports are processed to extract financial information to reward the cooperative nodes, and contextual information such as the broken links to build up a trust system to measure the nodes’ packet-relay success ratios in terms of trust values. A node’s trust value is degraded whenever it does not relay a packet and improved whenever it does. A node is identified as malicious and excluded from the network once its trust value reaches to a threshold. Using trust system is necessary to keep track of the nodes’ long-term behaviors because the network packets may be dropped normally, e.g., due to mobility, or temporarily, e.g., due to network congestion, but the high frequency of packet drop is an obvious misbehavior. Then, we propose a trust-based and energy-aware routing protocol to route traffics through the highly trusted nodes having sufficient residual energy in order to establish stable routes and thus minimize the probability of route breakage. A node’s trust value is a real and live measurement to the node’s failure probability and mobility level, i.e., the low-mobility nodes having large hardware resources can perform packet relay more efficiently. In this way, the proposed protocol stimulates the nodes not only to cooperate but also to improve their packet-relay success ratio and tell the truth about their residual energy to improve their trust values and thus raise their chances to participate in future routes.
Finally, we propose a privacy-preserving routing and incentive protocol for hybrid ad hoc wireless network. Micropayment is used to stimulate the nodes’ cooperation without submitting payment receipts. We only use the lightweight hashing and symmetric-key-cryptography operations to preserve the users’ privacy. The nodes’ pseudonyms are efficiently computed using hashing operations. Only trusted parties can link these pseudonyms to the real identities for charging and rewarding operations. Moreover, our protocol protects the location privacy of the anonymous source and destination nodes.
Extensive analysis and simulations demonstrate that our protocols can secure the payment and trust calculation, preserve the users’ privacy with acceptable overhead, and precisely identify the malicious and the cheating nodes. Moreover, the simulation and measurement results demonstrate that our routing protocols can significantly improve route stability and thus the packet delivery ratio due to stimulating the selfish nodes’ cooperation, evicting the malicious nodes, and making informed decisions regarding route selection. In addition, the processing and submitting overheads of the payment-reports are incomparable with those of the receipts in the receipt-based incentive protocols. Our protocol also requires incomparable overhead to the signature-based protocols because the lightweight hashing operations dominate the nodes’ operations.
|
169 |
Auditable And Verifiable Electronic Voting With Homomorphic Rsa TallyingYucel, Okan 01 July 2010 (has links) (PDF)
In this work, we investigate the general structure and the concepts behind the contemporary electronic voting schemes, with special emphasis on voter verifiable preferential voting, homomorphic tallying and voter privacy. We firstly propose a modification in the Single Transferable Voting (STV) method to be applied to large scale elections with electoral barriers. Our proposal prevents the loss of votes and distributes them securely to the second or higher choices of their voters. This method is most suitably used in e-voting with the voter verifiable &ldquo / Prê / t à / Voter: All-In-One&rdquo / scheme that utilizes mix-networks for anonymity.
We present a case study considering 2007 Turkish Parliamentary Elections to demonstrate the effect of preferential voting on the election systems that have electoral barriers. After the mathematical formulation of the election procedure, we calculate the wasted votes in 2007 elections and present simulation results for 69 election regions (that have no independent parliament members) by using a combination of &ldquo / modified STV and d&rsquo / Hondt&rdquo / methods, according to four different, politically unbiased scenarios on the distribution of secondary vote choices.
Additionally, we modify the &ldquo / Prê / t à / Voter: All-In-One&rdquo / scheme by proposing three security enhancing modifications in its ballot construction phase: 1) ballot serial number, 2) digital signature of the first clerk in the mix-net, 3) different random numbers for each row of the ballot.
Finally, we demonstrate the potential of multiplicative homomorphic algorithms like RSA for homomorphic tallying. The idea is based on the association of each candidate on the electronic ballot with a prime number, and unique prime factorization of the general vote product. We propose novel randomization methods for homomorphic RSA tallying, and discuss the performance and complexity of the scheme with such randomizations. Our suggestion for an auditable and verifiable e-voting scheme that employs homomorphic RSA tallying with proper randomization has advantages over El Gamal and Paillier tallying, such as having the least encryption complexity and strong anonymity resistant to unlimited computational power.
|
170 |
Anonymitet och YouTube : Konsekvenser för YouTube-användares kommentarer i och med minskad anonymitet / Anonymity and YouTube : How reducing anonymity for YouTube-users affects their way of writing commentsKarlsson, Katarina, Andersén, Jenny January 2012 (has links)
Denna studie undersöker hur minskad anonymitet kan förändra sättet människor skriver kommentarer på YouTube-videor. YouTube begärde nyligen att användarna skulle ange sina fullständiga namn. Användare är ännu inte skyldiga att ändra sitt användarnamn, men om de inte gör det ombes de att svara på varför de väljer att ha kvar sitt alias. För att undersöka detta lät vi först användare svara på en enkät för att se vad de tycker om att vara anonym kontra att ge ut sitt riktiga namn, och om att ge sitt riktiga namn gör dem mer uppmärksamma kring deras sätt att kommentera på YouTube. Sedan, för att se vad som verkligen händer i kommentarsfälten, gick vi igenom ett antal kommentarer för att hitta mönster i hur ett alias kontra ett riktigt namn relaterar till processen att skriva negativa kontra positiva kommentarer. Kommentarerna analyserades med hjälp av en modell som mäter olika grader av negativitet och positivitet i en kommentar. Våra studier visar att ändringen från ett alias till riktigt namn, påverkar hur kommentarer skrivs och att ett högre antal negativa kommentarer kommer från användare som använder ett alias. Resultatet är en indikation på hur minskning av anonymitet kan leda till mindre negativitet i YouTubes kommentarsfält. / This study examines how reducing anonymity options can change the way people write comments on YouTube-videos. YouTube recently requested users to enter their real names as a username. Users are not yet obligated to do so, but if they do not, they are asked to answer why they chose remain their alias. To investigate this we first let users answer a survey to see what they felt about being anonymous versus giving their real name, and if providing their real name made them more cautious about their way of interacting on YouTube. Then, to see what really is going on in the comment sections, we went through a group of comments to spot patterns in how an alias or a real name is related to the process of writing negative versus positive comments. Comments were analyzed with help from a model that measures the stages of negativity and positivity in a comment. Our studies indicate that the change from alias to real name, make an impact in how comments are made and that much higher rate of negative comments come from users using an alias. The result is an indication that less anonymity may lead to less negativity in YouTube’s comment sections.
|
Page generated in 0.059 seconds