209 resultados para Anonymity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe and evaluate options for providing anonymous IP service, argue for the further investigation of local anonymity, and sketch a framework for the implementation of locally anonymous networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The influence of communication technology on group decision-making has been examined in many studies. But the findings are inconsistent. Some studies showed a positive effect on decision quality, other studies have shown that communication technology makes the decision even worse. One possible explanation for these different findings could be the use of different Group Decision Support Systems (GDSS) in these studies, with some GDSS better fitting to the given task than others and with different sets of functions. This paper outlines an approach with an information system solely designed to examine the effect of (1) anonymity, (2) voting and (3) blind picking on decision quality, discussion quality and perceived quality of information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hunter-gatherers are often ascribed a “monistic” worldview at odds with the nature-society dichotomy. The centerpiece of this claim is that they view hunting as similar to sharing within the band and prey animals as part of a common sphere of sociality. This article challenges this thesis. An examination of the work of its main proponents shows that it conflates two different senses of “animal”—the flesh-and-blood animals of the hunt and the animal Spirit that is said to control the animals. The sharing motif in hunting makes sense with respect to the anthropomorphic Spirit but not to the animals hunted. The conditions of the hunt as a spatiotemporal event provide further grounds for skepticism toward the idea of hunting-as-sharing. Drawing on biologist Robert Hinde’s model of relationships, I argue that hunting represents an anonymous one-off interaction that cannot develop into a personal relationship, in stark contrast to the durable forms of personalized sociality associated with the hunter-gatherer band. This is not to deny the possibility of human-animal cosociality in the form of personal relationships but rather to redirect the search away from the hunt to the interface with domesticated animals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two experiments investigated self-reported emotional reactions to photographs of people with attractive, unattractive or structurally disfigured faces. In Experiment 1 participants viewing disfigured faces reported raised levels of sorrow and curiosity but not raised levels of negative emotions. In Experiment 2 there was more negative emotion and less positive emotion reported under conditions of relatively high anonymity, compared to low anonymity, specific to disfigured faces, suggesting that self-reports are influenced by social desirability. Trait empathy was associated with sorrow and negative emotions when viewing disfigured faces. Disgust sensitivity was associated with negative emotions and inversely associated with positive emotions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Immanuel Kant’s publicity maxim states that other-regarding actions are wrong if their maxim is not compatible with their being made public. This has the effect of forbidding dissent or rebellion against tyranny, since rebels cannot make their intentions and plans public. However, new internet technologies offer public speech from behind the “shield” of anonymity, allowing dissent to be public but preventing reprisals from tyrants. This thesis examines not only this possibility, but the value of internet-based discursive spaces for politics, their viability as a mode for political communication, and their implications for Classical and Enlightenment approaches to politics and intellectual virtue. Anonymous internet communications favour logos-based reasoning and discourse, which, in the liberal-democratic tradition, is preferable to phronesis and its attendant elitism and chauvinism. These technologies can open new vistas for liberal-democratic politics.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduces extended Crowds protocols. Optional reading

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.