This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n10http://localhost/temp/predkladatel/
n6http://purl.org/net/nknouf/ns/bibtex#
n18http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n12http://linked.opendata.cz/resource/domain/vavai/subjekt/
n11http://linked.opendata.cz/ontology/domain/vavai/
n23https://schema.org/
n19http://linked.opendata.cz/resource/domain/vavai/zamer/
n22http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F12%3APU101771%21RIV13-MSM-26230___/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n14http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n15http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n20http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F12%3APU101771%21RIV13-MSM-26230___
rdf:type
skos:Concept n11:Vysledek
rdfs:seeAlso
http://www.springer.com/computer/communication+networks/book/978-1-4471-4050-4
dcterms:description
This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sent by an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems. This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sent by an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems.
dcterms:title
Computational Social Networks - Security and Privacy Computational Social Networks - Security and Privacy
skos:prefLabel
Computational Social Networks - Security and Privacy Computational Social Networks - Security and Privacy
skos:notation
RIV/00216305:26230/12:PU101771!RIV13-MSM-26230___
n11:predkladatel
n12:orjk%3A26230
n3:aktivita
n4:S n4:Z
n3:aktivity
S, Z(MSM0021630528)
n3:dodaniDat
n5:2013
n3:domaciTvurceVysledku
n18:6897770 n18:2034867
n3:druhVysledku
n17:C
n3:duvernostUdaju
n21:S
n3:entitaPredkladatele
n22:predkladatel
n3:idSjednocenehoVysledku
128296
n3:idVysledku
RIV/00216305:26230/12:PU101771
n3:jazykVysledku
n16:eng
n3:klicovaSlova
security, anonymity, behavioural patterns, social networks
n3:klicoveSlovo
n15:anonymity n15:security n15:behavioural%20patterns n15:social%20networks
n3:kontrolniKodProRIV
[1472E8CC2690]
n3:mistoVydani
London
n3:nazevEdiceCisloSvazku
NEUVEDEN
n3:nazevZdroje
Computational Social Networks - Security and Privacy
n3:obor
n20:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetStranKnihy
347
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n5:2012
n3:tvurceVysledku
Malinka, Kamil Hanáček, Petr
n3:zamer
n19:MSM0021630528
s:numberOfPages
30
n14:doi
10.1007/978-1-4471-4051-1_13
n6:hasPublisher
Springer London
n23:isbn
978-1-4471-4050-4
n10:organizacniJednotka
26230