Anonymous communication and its importance in social networking

NP Hoang, D Pishva - … on advanced communication …, 2014 - ieeexplore.ieee.org
… Finally, we will discuss The Onion Router (TOR) as an ideal anonymous communication
method for social networking environment which employs asymmetric cryptography and use …

Social networking for anonymous communication systems: A survey

R Marques, A Zúquete - … Aspects of Social Networks (CASoN), 2011 - ieeexplore.ieee.org
social networking techniques to improve the anonymity degree provided by anonymous
communication … in exploiting trust relationships provided by social networks and how they can be …

Pisces: Anonymous communication using social networks

P Mittal, M Wright, N Borisov - arXiv preprint arXiv:1208.6326, 2012 - arxiv.org
… First, paths for anonymous communication are built without … Second, the network architecture
relies on a set of … protocol for anonymous communications that leverages users’ social links …

Strangers on your phone: Why people use anonymous communication applications

R Kang, L Dabbish, K Sutton - … -supported cooperative work & social …, 2016 - dl.acm.org
… responses are sometimes considered as more honest and valuable than what people
would get from identified social networks. Our findings suggest that incorporating …

Whispers in the dark: analysis of an anonymous social network

G Wang, B Wang, T Wang, A Nika, H Zheng… - Proceedings of the 2014 …, 2014 - dl.acm.org
social interactions. In this paper, we present results of the first large-scale empirical study
of an anonymous social network, using a complete 3-month trace of the Whisper network

Stor: Social network based anonymous communication in tor

P Zhou, X Luo, A Chen, RKC Chang - arXiv preprint arXiv:1110.5794, 2011 - arxiv.org
… However, the state-of-the-art anonymity networks do not provide … social network based trust
model to help anonymity networks circumvent malicious routers and obtain secure anonymity

Social network migration and anonymity expectations: What anonymous social network apps offer

N Gerhart, M Koohikamali - Computers in Human Behavior, 2019 - Elsevier
… motivations behind anonymity on social networks and why … why users are increasingly
using anonymous SNAs and using … traditional social networks to anonymous social networks. …

Anonymous authentication for trustworthy pervasive social networking

Z Yan, W Feng, P Wang - … on Computational Social Systems, 2015 - ieeexplore.ieee.org
… Not only people socially connected but also strangers physically in proximity … social network
for communications. PSN is an essential complement to the Internet online social networking

A novel scheme of anonymous authentication on trust in pervasive social networking

Z Yan, P Wang, W Feng - Information Sciences, 2018 - Elsevier
anonymous communications among nodes. And a backup token is temporarily used for
extending anonymous communications … user privacy and trustworthy social networking can be …

A protocol for anonymous short communications in social networks and its application to proximity-based services

F Buccafurri, V De Angelis, MF Idone… - Online Social Networks …, 2022 - Elsevier
… represented by an honest-but-curious social network provider) able to monitor the entire flow
… an anonymous communication protocol for short communications in social networks, based …