WorldWideScience

Sample records for anonymous nuclear markers

  1. Anonymous nuclear markers reveal taxonomic incongruence and long-term disjunction in a cactus species complex with continental-island distribution in South America.

    Science.gov (United States)

    Perez, Manolo F; Carstens, Bryan C; Rodrigues, Gustavo L; Moraes, Evandro M

    2016-02-01

    The Pilosocereus aurisetus complex consists of eight cactus species with a fragmented distribution associated to xeric enclaves within the Cerrado biome in eastern South America. The phylogeny of these species is incompletely resolved, and this instability complicates evolutionary analyses. Previous analyses based on both plastid and microsatellite markers suggested that this complex contained species with inherent phylogeographic structure, which was attributed to recent diversification and recurring range shifts. However, limitations of the molecular markers used in these analyses prevented some questions from being properly addressed. In order to better understand the relationship among these species and make a preliminary assessment of the genetic structure within them, we developed anonymous nuclear loci from pyrosequencing data of 40 individuals from four species in the P. aurisetus complex. The data obtained from these loci were used to identify genetic clusters within species, and to investigate the phylogenetic relationship among these inferred clusters using a species tree methodology. Coupled with a palaeodistributional modelling, our results reveal a deep phylogenetic and climatic disjunction between two geographic lineages. Our results highlight the importance of sampling more regions from the genome to gain better insights on the evolution of species with an intricate evolutionary history. The methodology used here provides a feasible approach to develop numerous genealogical molecular markers throughout the genome for non-model species. These data provide a more robust hypothesis for the relationship among the lineages of the P. aurisetus complex. PMID:26582125

  2. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  3. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  4. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540

  5. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  6. A Single Transcriptome of a Green Toad (Bufo viridis) Yields Candidate Genes for Sex Determination and -Differentiation and Non-Anonymous Population Genetic Markers.

    Science.gov (United States)

    Gerchen, Jörn F; Reichert, Samuel J; Röhr, Johannes T; Dieterich, Christoph; Kloas, Werner; Stöck, Matthias

    2016-01-01

    Large genome size, including immense repetitive and non-coding fractions, still present challenges for capacity, bioinformatics and thus affordability of whole genome sequencing in most amphibians. Here, we test the performance of a single transcriptome to understand whether it can provide a cost-efficient resource for species with large unknown genomes. Using RNA from six different tissues from a single Palearctic green toad (Bufo viridis) specimen and Hiseq2000, we obtained 22,5 Mio reads and publish >100,000 unigene sequences. To evaluate efficacy and quality, we first use this data to identify green toad specific candidate genes, known from other vertebrates for their role in sex determination and differentiation. Of a list of 37 genes, the transcriptome yielded 32 (87%), many of which providing the first such data for this non-model anuran species. However, for many of these genes, only fragments could be retrieved. In order to allow also applications to population genetics, we further used the transcriptome for the targeted development of 21 non-anonymous microsatellites and tested them in genetic families and backcrosses. Eleven markers were specifically developed to be located on the B. viridis sex chromosomes; for eight markers we can indeed demonstrate sex-specific transmission in genetic families. Depending on phylogenetic distance, several markers, which are sex-linked in green toads, show high cross-amplification success across the anuran phylogeny, involving nine systematic anuran families. Our data support the view that single transcriptome sequencing (based on multiple tissues) provides a reliable genomic resource and cost-efficient method for non-model amphibian species with large genome size and, despite limitations, should be considered as long as genome sequencing remains unaffordable for most species. PMID:27232626

  7. Anonymous marker loci within 400 kb of HLA-A generate haplotypes in linkage disequilibrium with the hemochromatosis gene (HFE)

    Energy Technology Data Exchange (ETDEWEB)

    Yaouanq, J.; Perichon, M.; Treut, A.L.; Kahloun, A.E.; Mauvieux, V.; Blayau, M.; Jouanolle, A.M.; Chauvel, B.; Le Gall, J.Y.; David, V. (Faculte de Medicine, Rennes (France)) (and others)

    1994-02-01

    The hemochromatosis gene (HFE) maps to 6p21.3 and is less than 1 cM from the HLA class I gene; however, the precise physical location of the gene has remained elusive and controversial. The unambiguous identification of a crossover event within hemochromatosis families is very difficult; it is particularly hampered by the variability of the phenotypic expression as well as by the sex- and age-related penetrance of the disease. For these considerations, traditional linkage analysis could prove of limited value in further refining the extrapolated physical position of HFE. The authors therefore embarked upon a linkage-disequilibrium analysis of HFE and normal chromosomes for the Brittany population. In this report, 66 hemochromatosis families yielding 151 hemochromatosis chromosomes and 182 normal chromosomes were RFLP-typed with a battery of probes, including two newly derived polymorphic markers from the 6.7 and HLA-F loci located 150 and 250 kb telomeric to HLA-A, respectively. The results suggest a strong peak of existing linkage disequilibrium focused within the i82-to-6.7 interval (approximately 250 kb). The zone of linkage disequilibrium is flanked by the i97 locus, positioned 30 kb proximal to i82, and the HLA-F gene, found 250 kb distal to HLA-A, markers of which display no significant association with HFE. These data support the possibility that HFE resides within the 400-kb expanse of DNA between i97 and HLA-F. Alternatively, the very tight association of HLA-A3 and allele 1 of the 6.7 locus, both of which are comprised by the major ancestral or founder HFE haplotype in Brittany, supports the possibility that the disease gene may reside immediately telomeric to the 6.7 locus within the linkage-disequilibrium zone. Additionally, hemochromatosis haplotypes possessing HLA-A11 and the low-frequency HLA-F polymorphism (allele 2) are supportive of a separate founder chromosome containing a second, independently arising mutant allele. 69 refs., 1 fig., 5 tabs.

  8. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  9. An Anonymity Revocation Technology for Anonymous Communication

    Science.gov (United States)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  10. TETX: a novel nuclear selection marker for Chlamydomonas reinhardtii transformation

    OpenAIRE

    Garcia-Echauri, Sergio A; Cardineau, Guy A.

    2015-01-01

    Background Transformation of microalgae to obtain recombinant proteins, lipids or metabolites of economic value is of growing interest due to low costs associated with culture growth and scaling up. At present there are only three stable nuclear selection markers for the transformation of Chlamydomonas reinhardtii, which is the most commonly transformed microalgae, specifically: the aminoglycoside phosphotransferaseses aph7and aphVIII and the phleomycin resistance ble gene. As several microal...

  11. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup;

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...

  12. Anonymity in science.

    Science.gov (United States)

    Neuroskeptic

    2013-05-01

    The history of science is replete with important works that were originally published without the author's legal name being revealed. Most modern scientists will have worked anonymously in their capacity as peer reviewers. But why is anonymity so popular? And is it a valid approach? I argue that pseudonymity and anonymity, although not appropriate for all forms of scientific communication, have a vital role to play in academic discourse. They can facilitate the free expression of interpretations and ideas, and can help to ensure that suggestions and criticisms are evaluated dispassionately, regardless of their source. PMID:23570959

  13. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  14. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  15. Insights into orphan nuclear receptors as prognostic markers and novel therapeutic targets for breast cancer

    OpenAIRE

    Reidun eAesoy; Colin D Clyne; Ashwini eChand

    2015-01-01

    The roles of orphan nuclear receptors in breast cancer development and progression are not well understood. In this review, we correlate orphan nuclear receptor expression in breast cancer tumour subtypes with patient outcomes and provide an overview of functional evidence that identifies candidate orphan nuclear receptors as prognostic markers or as therapeutic targets in breast cancer.

  16. Anonymity in Large Societies

    OpenAIRE

    Andrei Gomberg; Cesar Martinelli; Ricard Torres

    2002-01-01

    In a social choice model with an infinite number of agents, there may occur "equal size" coalitions that a preference aggregation rule should treat in the same manner. We introduce an axiom of equal treatment with respect to a measure of coalition size and explore its interaction with common axioms of social choice. We show that, provided the measure space is sufficiently rich in coalitions of the same measure, the new axiom is the natural extension of the concept of anonymity, and in particu...

  17. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  18. Efficient Anonymizations with Enhanced Utility

    Directory of Open Access Journals (Sweden)

    Jacob Goldberger

    2010-08-01

    Full Text Available One of the most well studied models of privacy preservation is k-anonymity. Previous studies of k-anonymization used various utility measures that aim at enhancing the correlation between the original public data and the generalized public data. We, bearing in mind that a primary goal in releasing the anonymized database for datamining is to deducemethods of predicting the private data from the public data, propose a new information-theoretic measure that aims at enhancing the correlation between the generalized public data and the private data. Such a measure significantly enhances the utility of the released anonymized database for data mining. We then proceed to describe a new algorithm that is designed to achieve k-anonymity with high utility, independently of the underlying utility measure. That algorithm is based on a modified version of sequential clustering which is the method of choice in clustering. Experimental comparison with four well known algorithms of k-anonymity show that the sequential clustering algorithm is an efficient algorithm that achieves the best utility results. We also describe a modification of the algorithm that outputs k-anonymizations which respect the additional security measure of l-diversity.

  19. Narcotics Anonymous: Anonymity, admiration, and prestige in an egalitarian community

    OpenAIRE

    Snyder, Jeffrey K.; Fessler, Daniel M.T.

    2014-01-01

    Narcotics Anonymous (NA) supports long-term recovery for those addicted to drugs. Paralleling social dynamics in many small-scale societies, NA exhibits tension between egalitarianism and prestige-based hierarchy, a problem exacerbated by the addict’s personality as characterized by NA’s ethnopsychology.  We explore how NA’s central principle of anonymity normatively translates into egalitarianism among group members.  Turning to the lived reality of membership, building on Carr’s (2011) conc...

  20. Proliferating cell nuclear antigen: a marker for hepatocellular proliferation in rodents.

    OpenAIRE

    Eldrige, S R; Butterworth, B E; Goldsworthy, T L

    1993-01-01

    Two different markers for quantitating cell proliferation were evaluated in livers of control and chemically treated mice and rats. Proliferating cell nuclear antigen (PCNA), an endogenous cell replication marker, and bromodeoxyuridine (BrdU), an exogenously administered DNA precursor label, were detected in formalin-fixed, paraffin-embedded tissues using immunohistochemical techniques. The percentage of cells in S phase (labeling indexes, LI) evaluated as PCNA- or BrdU-positive hepatocellula...

  1. Nuclear YB-1 expression as a negative prognostic marker in nonsmall cell lung cancer.

    Science.gov (United States)

    Gessner, C; Woischwill, C; Schumacher, A; Liebers, U; Kuhn, H; Stiehl, P; Jürchott, K; Royer, H D; Witt, C; Wolff, G

    2004-01-01

    The human Y-box binding protein, YB-1, is a multifunctional protein that regulates gene expression. Nuclear expression of YB-1 has been associated with chemoresistance and poor prognosis of tumour patients. Representative samples from autopsied material of primary tumours from 77 patients with NSCLC were investigated by immunohistochemistry for subcellular distribution of YB-1 and p53, in order to evaluate the prognostic role of nuclear expression of YB-1. Cytoplasmic YB-1 expression was found in all tumour samples, whereas nuclear expression was only observed in 48%. There was no correlation with histological classification, clinical parameters or tumour size, stage and metastasis status. However, patients with positive nuclear YB-1 expression in tumours showed reduced survival times when compared with patients without nuclear expression. Including information about the histology and mutational status for p53 increased the prognostic value of nuclear YB-1. Patients with nuclear YB-1 expression and p53 mutations had the worst prognosis (median survival 3 months), while best outcome was found in patients with no nuclear YB-1 and wildtype p53 (median survival 15 months). This suggests that the combined analysis of both markers allows a better identification of subgroups with varying prognosis. Nuclear expression of Y-box binding protien seems to be an independent prognostic marker.

  2. Anonymity and Historical-Anonymity in Location-Based Services

    Science.gov (United States)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  3. RAD-seq derived genome-wide nuclear markers resolve the phylogeny of tunas

    KAUST Repository

    Díaz-Arce, Natalia

    2016-06-07

    Although species from the genus Thunnus include some of the most commercially important and most severely overexploited fishes, the phylogeny of this genus is still unresolved, hampering evolutionary and traceability studies that could help improve conservation and management strategies for these species. Previous attempts based on mitochondrial and nuclear markers were unsuccessful in inferring a congruent and reliable phylogeny, probably due to mitochondrial introgression events and lack of enough phylogenetically informative markers. Here we infer the first genome-wide nuclear marker-based phylogeny of tunas using restriction site associated DNA sequencing (RAD-seq) data. Our results, derived from phylogenomic inferences obtained from 128 nucleotide matrices constructed using alternative data assembly procedures, support a single Thunnus evolutionary history that challenges previous assumptions based on morphological and molecular data.

  4. RAD-seq derived genome-wide nuclear markers resolve the phylogeny of tunas.

    Science.gov (United States)

    Díaz-Arce, Natalia; Arrizabalaga, Haritz; Murua, Hilario; Irigoien, Xabier; Rodríguez-Ezpeleta, Naiara

    2016-09-01

    Although species from the genus Thunnus include some of the most commercially important and most severely overexploited fishes, the phylogeny of this genus is still unresolved, hampering evolutionary and traceability studies that could help improve conservation and management strategies for these species. Previous attempts based on mitochondrial and nuclear markers were unsuccessful in inferring a congruent and reliable phylogeny, probably due to mitochondrial introgression events and lack of enough phylogenetically informative markers. Here we infer the first genome-wide nuclear marker-based phylogeny of tunas using restriction site associated DNA sequencing (RAD-seq) data. Our results, derived from phylogenomic inferences obtained from 128 nucleotide matrices constructed using alternative data assembly procedures, support a single Thunnus evolutionary history that challenges previous assumptions based on morphological and molecular data. PMID:27286653

  5. Anonymous online purchases with exhaustive operational security

    OpenAIRE

    Van Mieghem, Vincent; Pouwelse, Johan

    2015-01-01

    This paper describes the process of remaining anonymous online and its concurrent operational security that has to be performed. It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items. Different aspects of the operational security process as well as anonymously funding with cryptocurrencies are described. Eventually it is shown how to anonymously purchase items and services from the hidden web, as well as the delivery. It is shown ...

  6. Molecular phylogeny of elasmobranchs inferred from mitochondrial and nuclear markers.

    Science.gov (United States)

    Pavan-Kumar, A; Gireesh-Babu, P; Babu, P P Suresh; Jaiswar, A K; Hari Krishna, V; Prasasd, K Pani; Chaudhari, Aparna; Raje, S G; Chakraborty, S K; Krishna, Gopal; Lakra, W S

    2014-01-01

    The elasmobranchs (sharks, rays and skates) being the extant survivors of one of the earliest offshoots of the vertebrate evolutionary tree are good model organisms to study the primitive vertebrate conditions. They play a significant role in maintaining the ecological balance and have high economic value. Due to over-exploitation and illegal fishing worldwide, the elasmobranch stocks are being decimated at an alarming rate. Appropriate management measures are necessary for restoring depleted elasmobranch stocks. One approach for restoring stocks is implementation of conservation measures and these measures can be formulated effectively by knowing the evolutionary relationship among the elasmobranchs. In this study, a total of 30 species were chosen for molecular phylogeny studies using mitochondrial cytochrome c oxidase subunit I, 12S ribosomal RNA gene and nuclear Internal Transcribed Spacer 2. Among different genes, the combined dataset of COI and 12S rRNA resulted in a well resolved tree topology with significant bootstrap/posterior probabilities values. The results supported the reciprocal monophyly of sharks and batoids. Within Galeomorphii, Heterodontiformes (bullhead sharks) formed as a sister group to Lamniformes (mackerel sharks): Orectolobiformes (carpet sharks) and to Carcharhiniformes (ground sharks). Within batoids, the Myliobatiformes formed a monophyly group while Pristiformes (sawfishes) and Rhinobatiformes (guitar fishes) formed a sister group to all other batoids.

  7. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...

  8. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...

  9. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  10. Nuclear microsatellite markers for population genetic studies in sugar maple (Acer saccharum Marsh.

    Directory of Open Access Journals (Sweden)

    Sudhir Khodwekar

    2015-12-01

    Full Text Available A set of seven new nuclear microsatellite markers (nSSRs was developedfor sugar maple (Acer saccharum Marsh. using paired-end Illumina sequencing. Out of 96 primers screened in a panel of six unrelated individuals, seven markers amplified polymorphic products. The utility of these markers, in addition to six already published microsatellites, for genetic variation and gene flow studies was assessed. Out of the seven newly developed markers, three amplified multiple fragments and were interpreted as dominant (absence/presence markers, while four markers amplified a maximum of two amplification products per sample. The six published microsatellites and three of the four newly developed markers showed regular segregation in an open-pollinated single tree progeny. Observed heterozygosity (Ho and expected heterozygosity (He in 48 individuals from one population ranged from 0.436 to 0.917 and from 0.726 to 0.894, respectively. Dominant markers revealed 64 variable positions and moderate genetic variation within the population (He = 0.102, Shannon’s I = 0.193. Paternity analyses in the program CERVUS at co-dominant markers showed effective dispersal of pollen in the sugar maple population both at 95% and 80% confidence levels. Dependent on the confidence level, the mean pollen dispersal distance within the population ranged from 33.25 m to 38.75 m and gene flow from utside the stand from 78% to 82%. The absence of fine-scale Spatial Genetic Structure (SGS suggested effective dispersal of both seeds and pollen.

  11. Movement Data Anonymity through Generalization

    Directory of Open Access Journals (Sweden)

    Anna Monreale

    2010-08-01

    Full Text Available Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the movements of people and vehicles, producing society-wide mobility databases. This is a challenging scenario for data analysis and mining. On the one hand, exciting opportunities arise out of discovering new knowledge about human mobile behavior, and thus fuel intelligent info-mobility applications. On other hand, new privacy concerns arise when mobility data are published. The risk is particularly high for GPS trajectories, which represent movement of a very high precision and spatio-temporal resolution: the de-identification of such trajectories (i.e., forgetting the ID of their associated owners is only a weak protection, as generally it is possible to re-identify a person by observing her routine movements. In this paper we propose a method for achieving true anonymity in a dataset of published trajectories, by defining a transformation of the original GPS trajectories based on spatial generalization and k-anonymity. The proposed method offers a formal data protection safeguard, quantified as a theoretical upper bound to the probability of re-identification. We conduct a thorough study on a real-life GPS trajectory dataset, and provide strong empirical evidence that the proposed anonymity techniques achieve the conflicting goals of data utility and data privacy. In practice, the achieved anonymity protection is much stronger than the theoretical worst case, while the quality of the cluster analysis on the trajectory data is preserved.

  12. Nuclear translocation of glutathione transferase omega is a progression marker in Barrett's esophagus

    DEFF Research Database (Denmark)

    Piaggi, Simona; Marchi, Santino; Ciancia, Eugenio;

    2009-01-01

    fraction of BE patients. This study was aimed to investigate the possible role of glutathione-S-transferase-omega 1 (GSTO1), a recently discovered member of the glutathione-S-transferase family, as a progression marker in the Barrett's disease in order to improve the diagnosis of Ni...... equally divided between nuclear, cytoplasmic and diffuse staining (2 each, respectively). Experiments in vitro showed that in human HeLa cancer cells, GSTO1 translocates into the nucleus as a consequence of heath shock. These findings suggested that the nuclear translocation of glutathione-S-transferase...

  13. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  14. Quantum communications with an anonymous receiver

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    A new protocol for the anonymous communication of quantum information is proposed. The anonymity of the receiver and the privacy of the quantum information are perfectly protected except with exponentially small probability in this protocol. Furthermore, this protocol uses single photons to construct anonymous entanglement instead of multipartite entangled states, and therefore it reduces quantum resources compared with the pioneering work.

  15. Nuclear ribosomal internal transcribed spacer (ITS) region as a universal DNA barcode marker for Fungi

    Science.gov (United States)

    Schoch, Conrad L.; Seifert, Keith A.; Huhndorf, Sabine; Robert, Vincent; Spouge, John L.; Levesque, C. André; Chen, Wen; Bolchacova, Elena; Voigt, Kerstin; Crous, Pedro W.; Miller, Andrew N.; Wingfield, Michael J.; Aime, M. Catherine; An, Kwang-Deuk; Bai, Feng-Yan; Barreto, Robert W.; Begerow, Dominik; Bergeron, Marie-Josée; Blackwell, Meredith; Boekhout, Teun; Bogale, Mesfin; Boonyuen, Nattawut; Burgaz, Ana R.; Buyck, Bart; Cai, Lei; Cai, Qing; Cardinali, G.; Chaverri, Priscila; Coppins, Brian J.; Crespo, Ana; Cubas, Paloma; Cummings, Craig; Damm, Ulrike; de Beer, Z. Wilhelm; de Hoog, G. Sybren; Del-Prado, Ruth; Dentinger, Bryn; Diéguez-Uribeondo, Javier; Divakar, Pradeep K.; Douglas, Brian; Dueñas, Margarita; Duong, Tuan A.; Eberhardt, Ursula; Edwards, Joan E.; Elshahed, Mostafa S.; Fliegerova, Katerina; Furtado, Manohar; García, Miguel A.; Ge, Zai-Wei; Griffith, Gareth W.; Griffiths, K.; Groenewald, Johannes Z.; Groenewald, Marizeth; Grube, Martin; Gryzenhout, Marieka; Guo, Liang-Dong; Hagen, Ferry; Hambleton, Sarah; Hamelin, Richard C.; Hansen, Karen; Harrold, Paul; Heller, Gregory; Herrera, Cesar; Hirayama, Kazuyuki; Hirooka, Yuuri; Ho, Hsiao-Man; Hoffmann, Kerstin; Hofstetter, Valérie; Högnabba, Filip; Hollingsworth, Peter M.; Hong, Seung-Beom; Hosaka, Kentaro; Houbraken, Jos; Hughes, Karen; Huhtinen, Seppo; Hyde, Kevin D.; James, Timothy; Johnson, Eric M.; Johnson, Joan E.; Johnston, Peter R.; Jones, E.B. Gareth; Kelly, Laura J.; Kirk, Paul M.; Knapp, Dániel G.; Kõljalg, Urmas; Kovács, Gábor M.; Kurtzman, Cletus P.; Landvik, Sara; Leavitt, Steven D.; Liggenstoffer, Audra S.; Liimatainen, Kare; Lombard, Lorenzo; Luangsa-ard, J. Jennifer; Lumbsch, H. Thorsten; Maganti, Harinad; Maharachchikumbura, Sajeewa S. N.; Martin, María P.; May, Tom W.; McTaggart, Alistair R.; Methven, Andrew S.; Meyer, Wieland; Moncalvo, Jean-Marc; Mongkolsamrit, Suchada; Nagy, László G.; Nilsson, R. Henrik; Niskanen, Tuula; Nyilasi, Ildikó; Okada, Gen; Okane, Izumi; Olariaga, Ibai; Otte, Jürgen; Papp, Tamás; Park, Duckchul; Petkovits, Tamás; Pino-Bodas, Raquel; Quaedvlieg, William; Raja, Huzefa A.; Redecker, Dirk; Rintoul, Tara L.; Ruibal, Constantino; Sarmiento-Ramírez, Jullie M.; Schmitt, Imke; Schüßler, Arthur; Shearer, Carol; Sotome, Kozue; Stefani, Franck O.P.; Stenroos, Soili; Stielow, Benjamin; Stockinger, Herbert; Suetrong, Satinee; Suh, Sung-Oui; Sung, Gi-Ho; Suzuki, Motofumi; Tanaka, Kazuaki; Tedersoo, Leho; Telleria, M. Teresa; Tretter, Eric; Untereiner, Wendy A.; Urbina, Hector; Vágvölgyi, Csaba; Vialle, Agathe; Vu, Thuy Duong; Walther, Grit; Wang, Qi-Ming; Wang, Yan; Weir, Bevan S.; Weiß, Michael; White, Merlin M.; Xu, Jianping; Yahr, Rebecca; Yang, Zhu L.; Yurkov, Andrey; Zamora, Juan-Carlos; Zhang, Ning; Zhuang, Wen-Ying; Schindel, David

    2012-01-01

    Six DNA regions were evaluated as potential DNA barcodes for Fungi, the second largest kingdom of eukaryotic life, by a multinational, multilaboratory consortium. The region of the mitochondrial cytochrome c oxidase subunit 1 used as the animal barcode was excluded as a potential marker, because it is difficult to amplify in fungi, often includes large introns, and can be insufficiently variable. Three subunits from the nuclear ribosomal RNA cistron were compared together with regions of three representative protein-coding genes (largest subunit of RNA polymerase II, second largest subunit of RNA polymerase II, and minichromosome maintenance protein). Although the protein-coding gene regions often had a higher percent of correct identification compared with ribosomal markers, low PCR amplification and sequencing success eliminated them as candidates for a universal fungal barcode. Among the regions of the ribosomal cistron, the internal transcribed spacer (ITS) region has the highest probability of successful identification for the broadest range of fungi, with the most clearly defined barcode gap between inter- and intraspecific variation. The nuclear ribosomal large subunit, a popular phylogenetic marker in certain groups, had superior species resolution in some taxonomic groups, such as the early diverging lineages and the ascomycete yeasts, but was otherwise slightly inferior to the ITS. The nuclear ribosomal small subunit has poor species-level resolution in fungi. ITS will be formally proposed for adoption as the primary fungal barcode marker to the Consortium for the Barcode of Life, with the possibility that supplementary barcodes may be developed for particular narrowly circumscribed taxonomic groups. PMID:22454494

  16. Genome- and transcriptome-assisted development of nuclear insertion/deletion markers for Calanus species (Copepoda: Calanoida) identification

    DEFF Research Database (Denmark)

    Smolina, I.; Kollias, S.; Poortvliet, M.;

    2014-01-01

    Copepods of the genus Calanus are key zooplankton species in temperate to arctic marine ecosystems. Despite their ecological importance, species identification remains challenging. Furthermore, the recent report of hybrids among Calanus species highlights the need for diagnostic nuclear markers t...

  17. Introgression evidence and phylogenetic relationships among three (ParaMisgurnus species as revealed by mitochondrial and nuclear DNA markers

    Directory of Open Access Journals (Sweden)

    Jakovlić I.

    2013-01-01

    Full Text Available The taxonomy of (ParaMisgurnus genera is still debated. We therefore used mitochondrial and nuclear DNA markers to analyze the phylogenetic relationships among Misgurnus anguillicaudatus, Paramisgurnus dabryanus and Misgurnus fossilis. Differing phylogenetic signals from mitochondrial and nuclear marker data suggest an introgression event in the history of M. anguillicaudatus and M. mohoity. No substantial genetic evidence was found that Paramisgurnus dabryanus should be classified as a separate genus.

  18. Nuclear SSR Markers for Miscanthus, Saccharum, and Related Grasses (Saccharinae, Poaceae

    Directory of Open Access Journals (Sweden)

    Trevor R. Hodkinson

    2013-11-01

    Full Text Available Premise of the study: We developed nuclear simple sequence repeat (SSR markers for the characterization of the biomass crop Miscanthus, especially M. sacchariflorus, M. sinensis, and M. ×giganteus, and tested for cross-species amplification. Methods and Results: Twenty-nine SSR markers (di- and tetranucleotide repeats were developed from DNA sequences obtained from 192 clones from an enriched genomic library of M. sinensis. All markers were successfully amplified in M. sacchariflorus, M. sinensis, and M. ×giganteus, and 19 amplified across a broad range of Miscanthus species. Polymorphism information content and expected heterozygosity values (19 locus sample were 0.88 and 0.89, respectively, for M. sinensis, 0.48 and 0.54 for M. sacchariflorus, and were the lowest in M. ×giganteus (0.33, 0.41. Thirteen out of 19 primer pairs showed cross-species amplification in non-Miscanthus sensu stricto taxa. Conclusions: The new set of 29 SSR markers will be of high value for characterizing Miscanthus germplasm collections, for prebreeding, and for assessing variation in natural populations.

  19. Transcriptome-mining for single-copy nuclear markers in ferns.

    Directory of Open Access Journals (Sweden)

    Carl J Rothfels

    Full Text Available BACKGROUND: Molecular phylogenetic investigations have revolutionized our understanding of the evolutionary history of ferns-the second-most species-rich major group of vascular plants, and the sister clade to seed plants. The general absence of genomic resources available for this important group of plants, however, has resulted in the strong dependence of these studies on plastid data; nuclear or mitochondrial data have been rarely used. In this study, we utilize transcriptome data to design primers for nuclear markers for use in studies of fern evolutionary biology, and demonstrate the utility of these markers across the largest order of ferns, the Polypodiales. PRINCIPAL FINDINGS: We present 20 novel single-copy nuclear regions, across 10 distinct protein-coding genes: ApPEFP_C, cryptochrome 2, cryptochrome 4, DET1, gapCpSh, IBR3, pgiC, SQD1, TPLATE, and transducin. These loci, individually and in combination, show strong resolving power across the Polypodiales phylogeny, and are readily amplified and sequenced from our genomic DNA test set (from 15 diploid Polypodiales species. For each region, we also present transcriptome alignments of the focal locus and related paralogs-curated broadly across ferns-that will allow researchers to develop their own primer sets for fern taxa outside of the Polypodiales. Analyses of sequence data generated from our genomic DNA test set reveal strong effects of partitioning schemes on support levels and, to a much lesser extent, on topology. A model partitioned by codon position is strongly favored, and analyses of the combined data yield a Polypodiales phylogeny that is well-supported and consistent with earlier studies of this group. CONCLUSIONS: The 20 single-copy regions presented here more than triple the single-copy nuclear regions available for use in ferns. They provide a much-needed opportunity to assess plastid-derived hypotheses of relationships within the ferns, and increase our capacity to

  20. Mitochondrial Genome and Nuclear Markers Provide New Insight into the Evolutionary History of Macaques.

    Science.gov (United States)

    Jiang, Juan; Yu, Jianqiu; Li, Jing; Li, Peng; Fan, Zhenxin; Niu, Lili; Deng, Jiabo; Yue, Bisong; Li, Jing

    2016-01-01

    The evolutionary history of macaques, genus Macaca, has been under debate due to the short times of divergence. In this study, maternal, paternal, and biparental genetic systems were applied to infer phylogenetic relationships among macaques and to trace ancient hybridization events in their evolutionary history. Using a PCR display method, 17 newly phylogenetically informative Alu insertions were identified from M. assamensis. We combined presence/absence analysis of 84 Alu elements with mitochondrial genomes as well as nuclear sequences (five autosomal genes, two Y chromosomal genes, and one X chromosomal fragment) to reconstruct a robust macaque phylogeny. Topologies generated from different inherited markers were similar supporting six well defined species groups and a close relationship of M. assamensis and M. thibetana, but differed in the placing of M. arctoides. Both Alu elements and nuclear genes supported that M. arctoides was close to the sinica group, whereas the mitochondrial data clustered it into the fascicularis/mulatta lineage. Our results reveal that a sex-biased hybridization most likely occurred in the evolutionary history of M. arctoides, and suggest an introgressive pattern of male-mediated gene flow from the ancestors of M. arctoides to the M. mulatta population followed by nuclear swamping. According to the estimation of divergence dates, the hybridization occurred around 0.88~1.77 mya (nuclear data) or 1.38~2.56 mya (mitochondrial data). In general, our study indicates that a combination of various molecular markers could help explain complicated evolutionary relationships. Our results have provided new insights into the evolutionary history of macaques and emphasize that hybridization might play an important role in macaque evolution.

  1. Utility of nuclear DNA intron markers at lower taxonomic levels: phylogenetic resolution among nine Tragelaphus spp.

    Science.gov (United States)

    Willows-Munro, Sandi; Robinson, Terence J; Matthee, Conrad A

    2005-06-01

    Phylogenetic relationships among the nine spiral-horn antelope species of the African bovid tribe Tragelaphini are controversial. In particular, mitochondrial DNA sequencing studies are not congruent with previous morphological investigations. To test the utility of nuclear DNA intron markers at lower taxonomic levels and to provide additional data pertinent to tragelaphid evolution, we sequenced four nuclear DNA segments (MGF, PRKCI, SPTBN, and THY) and combined these data with mitochondrial DNA sequences from three genes (cytochrome b, 12S rRNA, and 16S rRNA). Our molecular supermatrix comprised 4682 characters which were analyzed independently and in combination. Parsimony and model based phylogenetic analyses of the combined nuclear DNA data are congruent with those derived from the analysis of mitochondrial gene sequences. The corroboration between nuclear and mtDNA gene trees reject the possibility that genetic processes such as lineage sorting, gene duplication/deletion and hybrid speciation account for the conflict evident in the previously published phylogenies. It suggests rather that the morphological characters used to delimit the Tragelaphid species are subject to convergent evolution. Divergence times among species, calculated using a relaxed Bayesian molecular clock, are consistent with hypotheses proposing that climatic oscillations and their impact on habitats were the major forces driving speciation in the tribe Tragelaphini. PMID:15878131

  2. Octopus: A Secure and Anonymous DHT Lookup

    CERN Document Server

    Wang, Qiyan

    2012-01-01

    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate ...

  3. Privacy-Preserving Updates to Anonymous Databases

    OpenAIRE

    Sivasubramanian, R.; K.P. KALIYAMURTHIE

    2013-01-01

    Suppose a medical facility connected with a research institution and the researchers can use themedical details of a patient without knowing the personal details. Thus the research data base used by theresearchers must be anonymized (Sanitized). We can consider another problem in the area of census.Individuals give the private information to a trusted party (Census Bureau) and the census bureau mustpublish anonymized or sanitized version of data. So anonymization is done for privacy. Our work...

  4. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  5. Testing a short nuclear marker for inferring staphylinid beetle diversity in an African tropical rain forest.

    Directory of Open Access Journals (Sweden)

    Birthe Thormann

    Full Text Available BACKGROUND: The use of DNA based methods for assessing biodiversity has become increasingly common during the last years. Especially in speciose biomes as tropical rain forests and/or in hyperdiverse or understudied taxa they may efficiently complement morphological approaches. The most successful molecular approach in this field is DNA barcoding based on cytochrome c oxidase I (COI marker, but other markers are used as well. Whereas most studies aim at identifying or describing species, there are only few attempts to use DNA markers for inventorying all animal species found in environmental samples to describe variations of biodiversity patterns. METHODOLOGY/PRINCIPAL FINDINGS: In this study, an analysis of the nuclear D3 region of the 28S rRNA gene to delimit species-like units is compared to results based on distinction of morphospecies. Data derived from both approaches are used to assess diversity and composition of staphylinid beetle communities of a Guineo-Congolian rain forest in Kenya. Beetles were collected with a standardized sampling design across six transects in primary and secondary forests using pitfall traps. Sequences could be obtained of 99% of all individuals. In total, 76 molecular operational taxonomic units (MOTUs were found in contrast to 70 discernible morphospecies. Despite this difference both approaches revealed highly similar biodiversity patterns, with species richness being equal in primary and secondary forests, but with divergent species communities in different habitats. The D3-MOTU approach proved to be an efficient tool for biodiversity analyses. CONCLUSIONS/SIGNIFICANCE: Our data illustrate that the use of MOTUs as a proxy for species can provide an alternative to morphospecies identification for the analysis of changes in community structure of hyperdiverse insect taxa. The efficient amplification of the D3-marker and the ability of the D3-MOTUs to reveal similar biodiversity patterns as analyses of

  6. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  7. Distributed anonymous discrete function computation

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2010-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage capabilities that do not grow with the network size. Furthermore, each node only knows its neighbors, not the entire graph. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we provide a necessary condition for computability which we show to be nearly sufficient, in the sense that every function that violates this condition can at least be approximated. The problem of computing suitably rounded averages in a distributed manner plays a central role in our development; we provide an algorithm that solves it in time that grows quadratically with the size of the network.

  8. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  9. Are both sympatric species Ilex perado and Ilex canariensis secretly hybridizing? Indication from nuclear markers collected in Tenerife

    Directory of Open Access Journals (Sweden)

    Manen Jean-François

    2004-11-01

    Full Text Available Abstract Background Intra-specific and intra-individual polymorphism is frequently observed in nuclear markers of Ilex (Aquifoliaceae and discrepancy between plastid and nuclear phylogenies is the rule in this genus. These observations suggest that inter-specific plastid or/and nuclear introgression played an important role in the process of evolution of Ilex. With the aim of a precise understanding of the evolution of this genus, two distantly related sympatric species collected in Tenerife (Canary Islands, I. perado and I. canariensis, were studied in detail. Introgression between these two species was previously never reported. One plastid marker (the atpB-rbcL spacer and two nuclear markers, the ribosomal internal transcribed spacer (ITS and the nuclear encoded plastid glutamine synthetase (nepGS were analyzed for 13 and 27 individuals of I. perado and I. canariensis, respectively. Results The plastid marker is intra-specifically constant and correlated with species identity. On the other hand, whereas the nuclear markers are conserved in I. perado, they are highly polymorphic in I. canariensis. The presence of pseudogenes and recombination in ITS sequences of I. canariensis explain this polymorphism. Ancestral sequence polymorphism with incomplete lineage sorting, or past or recent hybridization with an unknown species could explain this polymorphism, not resolved by concerted evolution. However, as already reported for many other plants, past or recent introgression of an alien genotype seem the most probable explanation for such a tremendous polymorphism. Conclusions Data do not allow the determination with certitude of the putative species introgressing I. canariensis, but I. perado is suspected. The introgression would be unilateral, with I. perado as the male donor, and the paternal sequences would be rapidly converted in highly divergent and consequently unidentifiable pseudogenes. At least, this study allows the establishment of

  10. The nuclear elongation factor-1α gene: a promising marker for phylogenetic studies of Triatominae (Hemiptera: Reduviidae).

    Science.gov (United States)

    Díaz, Sebastián; Triana-Chávez, Omar; Gómez-Palacio, Andrés

    2016-09-01

    Molecular systematics is a remarkable approach for understanding the taxonomic traits and allows the exploration of the inter-population dynamics of several species in the Triatominae subfamily that are involved in Trypanosoma cruzi transmission. Compared to other relevant species that transmit vector-borne diseases, such as some species of the Diptera, there are relatively few nuclear genetic markers available for systematic studies in the Triatominae subfamily. Molecular systematic studies performed on Triatominae are based on mitochondrial gene fragments and, less frequently, on nuclear ribosomal genes or spacers. Due to the fact that these markers can occasionally present problems such as nuclear mitochondrial genes (NUMTs) or intra-genomic variation for high gene copy numbers, it is necessary to use additional nuclear markers to more reliably address the molecular evolution of Triatominae. In this study, we performed phylogenetic analysis using the nuclear elongation factor-1 alpha (EF-1α) gene in individuals from 12 species belonging to the Triatomini and Rhodniini tribes. Genetic diversities and phylogenetic topologies were compared with those obtained for the mitochondrial 16S rRNA and Cytochrome b (cyt b) genes, as well as for the D2 variable region of the ribosomal 28S rRNA gene. These results indicate that the EF-1α marker exhibits an intermediate level of diversity compared to mitochondrial and nuclear ribosomal genes, and that phylogenetic analysis based on EF-1α is highly informative for resolving deep phylogenetic relationships in Triatominae, such as tribe or genera. PMID:27268149

  11. Ribonucleic acid stimulation of mammalian liver nuclear-envelope nucleoside triphosphatase. A possible enzymic marker for the nuclear envelope.

    Science.gov (United States)

    Agutter, P S; Harris, J R; Stevenson, I

    1977-03-15

    1. The specific activity of rat and pig liver nuclear-envelope nucleoside triphosphatase (EC 3.6.1.3) decreases when the system is depleted of RNA. The activity can be restored by adding high concentrations of yeast RNA to the assay medium. 2. Exogenous RNA also increases the activity of the enzyme in control envelopes (not RNA-depleted). The effect appears to be largely specific for poly(A) and poly(G); it is not stimulated by rRNA or tRNA preparations, ribonuclease-hydrolysed RNA, AMP, or double- or single-stranded DNA. 3. Inhibitors of the enzyme, in concentrations at which half-maximal inhibition of the enzyme is achieved, do not affect the percentage stimulation of the enzyme by yeast RNA. 4. The simulation is abolished by the inclusion of 150 mM-KCl or -NaCl in the assay medium, but not by increasing the assay pH to 8.5. 5. The results are discussed in the light of the possible role of the nucleoside triphosphatase in vivo in nucleo-cytoplasmic ribonucleoprotein translocation. 6. It is proposed that poly(G)-stimulated Mg2+-activated adenosine triphosphatase activity should be adopted as an enzymic marker for the nuclear envelope.

  12. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  13. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  14. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  15. Towards a Theory of Anonymous Networking

    CERN Document Server

    Ghaderi, J

    2009-01-01

    The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.

  16. Nuclear expression of β-catenin and stem cell markers as potential prognostic indicators in medulloblastoma

    Directory of Open Access Journals (Sweden)

    Kiran Krishne Gowda

    2012-01-01

    Full Text Available Aims: To study the prognostic role of β-catenin and stem cell markers in medulloblastoma (MB. Materials and Methods: Sixty cases of MB were retrospectively analyzed to study the expression of β-catenin, CD15, and CD133 by immunohistochemistry. Their expression was correlated with histological subtypes and event-free survival (EFS. Patients were divided into Group 1 and 2 based on non-occurrence and occurrence of events during the follow-up period. Results: Fifty of the 60 cases were of classic type of MB while nine were of desmoplastic subtype and one case showed chondroid and rhabdomyoblastic differentiation. Immunoreactivity for β-catenin was observed as nuclear and/or cytoplasmic positivity within the tumor cells. Forty-one (68.3% cases showed cytoplasmic positivity, while nuclear positivity was seen in 21 (35% cases. There was a significant correlation between nuclear expression of β-catenin and different histological subtypes by Chi-square test (P value<0.05. A statistically significant positive correlation of β-catenin nuclear positivity with EFS was observed. Among 60 cases, 37 cases (67.3% showed presence of CD15+ tumor cells with percentage of positivity varying between 0.1 to 17.1%. Overall, 42 of 60 (70% cases showed presence of CD133+ cells. The percentage of positivity varied between 0.1 to 16.5%. A statistically significant negative correlation of CD15 and CD133 positivity with EFS was observed. Conclusions: Nucleopositive β-catenin cases were associated with a favorable outcome on univariate analysis. Both CD15 and CD133 positivity were associated with a worse outcome on univariate analysis.

  17. A flexible approach to distributed data anonymization.

    Science.gov (United States)

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. PMID:24333850

  18. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  19. A complete plastid phylogeny of Daucus – concordance to nuclear results, and markers necessary for phylogenetic resolution

    Science.gov (United States)

    Premise of study: Our purposes were to (1) obtain a well-resolved plastid counterpart to the 94 gene nuclear ortholog gene phylogeny of Arbizu et al. (2014, Amer. J. Bot. 101:1666-1685; and Syst. Bot., in press), and (2) to investigate various classes and numbers of plastid markers necessary for a c...

  20. Providing Group Anonymity Using Wavelet Transform

    CERN Document Server

    Chertov, Oleg

    2010-01-01

    Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information. The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only. An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It's easy-to-implement, powerful enough, and might produce acceptable results if used properly. In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.

  1. Finding routes in anonymous sensor networks

    OpenAIRE

    Dutra, Renato C.; Barbosa, Valmir C

    2005-01-01

    We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink. In order to circumvent the restrictions imposed by anonymity, we rely on using the power level perceived by the sensors in the query from the sink. We introduce a simple distributed algorithm to achieve the building of routes to the sink and evaluate its performance by means of simulations.

  2. Security and Anonymity of Bitcoin Payments

    OpenAIRE

    Korošec, Peter

    2016-01-01

    This thesis presents the digital payment system Bitcoin. It describes the cryptography on which the system is based. Presented are the short history of the system and the principles of how it works. Highlighted are the state of anonymity that the system provides while making payments and the safety it guarantees while executing transactions. Within the context of anonymity, the state of masking the users identity within the payment system is described, together with warnings and mechanisms to...

  3. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  4. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  5. Investigation of nuclear nano-morphology marker as a biomarker for cancer risk assessment using a mouse model

    Science.gov (United States)

    Bista, Rajan K.; Uttam, Shikhar; Hartman, Douglas J.; Qiu, Wei; Yu, Jian; Zhang, Lin; Brand, Randall E.; Liu, Yang

    2012-06-01

    The development of accurate and clinically applicable tools to assess cancer risk is essential to define candidates to undergo screening for early-stage cancers at a curable stage or provide a novel method to monitor chemoprevention treatments. With the use of our recently developed optical technology--spatial-domain low-coherence quantitative phase microscopy (SL-QPM), we have derived a novel optical biomarker characterized by structure-derived optical path length (OPL) properties from the cell nucleus on the standard histology and cytology specimens, which quantifies the nano-structural alterations within the cell nucleus at the nanoscale sensitivity, referred to as nano-morphology marker. The aim of this study is to evaluate the feasibility of the nuclear nano-morphology marker from histologically normal cells, extracted directly from the standard histology specimens, to detect early-stage carcinogenesis, assess cancer risk, and monitor the effect of chemopreventive treatment. We used a well-established mouse model of spontaneous carcinogenesis--ApcMin mice, which develop multiple intestinal adenomas (Min) due to a germline mutation in the adenomatous polyposis coli (Apc) gene. We found that the nuclear nano-morphology marker quantified by OPL detects the development of carcinogenesis from histologically normal intestinal epithelial cells, even at an early pre-adenomatous stage (six weeks). It also exhibits a good temporal correlation with the small intestine that parallels the development of carcinogenesis and cancer risk. To further assess its ability to monitor the efficacy of chemopreventive agents, we used an established chemopreventive agent, sulindac. The nuclear nano-morphology marker is reversed toward normal after a prolonged treatment. Therefore, our proof-of-concept study establishes the feasibility of the SL-QPM derived nuclear nano-morphology marker OPL as a promising, simple and clinically applicable biomarker for cancer risk assessment and

  6. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives

    OpenAIRE

    Krentzman, Amy R.; Robinson, Elizabeth A. R.; Moore, Barbara C.; Kelly, John F.; Laudet, Alexandre B.; White, William L.; Zemore, Sarah E.; Kurtz, Ernest; Strobbe, Stephen

    2010-01-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.

  7. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    Science.gov (United States)

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524

  8. Anonymous Fingerprinting with Robust QIM Watermarking Techniques

    Directory of Open Access Journals (Sweden)

    R. L. Lagendijk

    2007-12-01

    Full Text Available Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer's identity multiple times, it is essential for the fingerprinting scheme to be anonymous. Kuribayashi and Tanaka, 2005, proposed an anonymous fingerprinting scheme based on a homomorphic additive encryption scheme, which uses basic quantization index modulation (QIM for embedding. In order, for this scheme, to provide sufficient security to the merchant, the buyer must be unable to remove the fingerprint without significantly degrading the purchased digital content. Unfortunately, QIM watermarks can be removed by simple attacks like amplitude scaling. Furthermore, the embedding positions can be retrieved by a single buyer, allowing for a locally targeted attack. In this paper, we use robust watermarking techniques within the anonymous fingerprinting approach proposed by Kuribayashi and Tanaka. We show that the properties of an additive homomorphic cryptosystem allow for creating anonymous fingerprinting schemes based on distortion compensated QIM (DC-QIM and rational dither modulation (RDM, improving the robustness of the embedded fingerprints. We evaluate the performance of the proposed anonymous fingerprinting schemes under additive-noise and amplitude-scaling attacks.

  9. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  10. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  11. Mapping of the nuclear fertility restorer gene for HL cytoplasmic male sterility in rice using microsatellite markers

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Bulked segregant analysis (BSA) of a BC1 population derived from Congguang 41A//Miyang 23/Congguang 41B was used to map the nuclear fertility restorer gene for Honglian (HL) cytoplasmic male sterility.One hundred and fifty-nine microsatellite primer pairs were screened for polymorphisms between the parents and between two bulks representing fertile and sterile plants.One microsatellite marker RM258 produced polymorphic products.The nuclear fertility restorer gene for HL cytoplasmic male sterility was mapped on chromosome 10,7.8cM from RM258.The restorer gene may be clustered on chromosome.

  12. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  13. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    OpenAIRE

    Wei Yang; Liusheng Huang; Fang Song

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of...

  14. Biological identifications through mitochondrial and nuclear molecular markers: the case of commercially important crabs from Indian EEZ

    OpenAIRE

    Cubelio, Sherine Sonia; Bineesh, K. K.; Raj, K.; Tewari, Suraj; Gopalakrishnan, Achamveettil; Valaparambil, Saidumohammad Basheer; Lakra, Wazir Singh

    2010-01-01

    The ability of a 600- 700 base pair section of mitochondrial and nuclear molecular markers (COI, 16S & ITS-I) to provide species level identifications has been demonstrated for large taxonomic assemblages of animals such as insects, birds, fishes and crustaceans. In the Indian context, there had been no comprehensive attempt to determine the molecular sytematics, evolutionary relationships or phylogeny within the crabs of genera Scylla, Portunus and Charybdis which suppor...

  15. Origins of the amphiploid species Brassica napus L. investigated by chloroplast and nuclear molecular markers

    Directory of Open Access Journals (Sweden)

    Allender Charlotte J

    2010-03-01

    Full Text Available Abstract Background The amphiploid species Brassica napus (oilseed rape, Canola is a globally important oil crop yielding food, biofuels and industrial compounds such as lubricants and surfactants. Identification of the likely ancestors of each of the two genomes (designated A and C found in B. napus would facilitate incorporation of novel alleles from the wider Brassica genepool in oilseed rape crop genetic improvement programmes. Knowledge of the closest extant relatives of the genotypes involved in the initial formation of B. napus would also allow further investigation of the genetic factors required for the formation of a stable amphiploid and permit the more efficient creation of fully fertile re-synthesised B. napus. We have used a combination of chloroplast and nuclear genetic markers to investigate the closest extant relatives of the original maternal progenitors of B. napus. This was based on a comprehensive sampling of the relevant genepools, including 83 accessions of A genome B. rapa L. (both wild and cultivated types, 94 accessions of B. napus and 181 accessions of C genome wild and cultivated B. oleracea L. and related species. Results Three chloroplast haplotypes occurred in B. napus. The most prevalent haplotype (found in 79% of accessions was not present within the C genome accessions but was found at low frequencies in B. rapa. Chloroplast haplotypes characteristic of B. napus were found in a small number of wild and weedy B. rapa populations, and also in two accessions of cultivated B. rapa 'brocoletto'. Whilst introgression of the B. napus chloroplast type in the wild and weedy B. rapa populations has been proposed by other studies, the presence of this haplotype within the two brocoletto accessions is unexplained. Conclusions The distribution of chloroplast haplotypes eliminate any of the C genome species as being the maternal ancestor of the majority of the B. napus accessions. The presence of multiple chloroplast

  16. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  17. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina;

    2013-01-01

    . While anonymity and confidentiality appear to be orthogonal properties, making anonymous communication confidential is more involved than one might expect, since the ciphertext might reveal which public key has been used to encrypt. To address this problem, public-key cryptosystems with enhanced...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...

  18. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  19. Automatic Control of Configuration of Web Anonymization

    Directory of Open Access Journals (Sweden)

    Tomas Sochor

    2013-01-01

    Full Text Available Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The results presented here focus on measuring the parameters of such deceleration in terms of response time, transmission speed and latency and proposing the way how to control it. This study focuses on TOR primarily because recent studies have concluded that other tools (like I2P and JAP provide worse service. Sets of 14 file locations and 30 web pages have been formed and the latency, response time and transmission speed during the page or file download were measured repeatedly both with TOR active in various configurations and without TOR. The main result presented here comprises several ways how to improve the TOR anonymization efficiency and the proposal for its automatic control. In spite of the fact that efficiency still remains too low compared to normal web traffic for ordinary use, its automatic control could make TOR a useful tool in special cases.

  20. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  1. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  2. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  3. Testing a Short Nuclear Marker for Inferring Staphylinid Beetle Diversity in an African Tropical Rain Forest

    OpenAIRE

    Birthe Thormann; Raupach, Michael J.; Thomas Wagner; Johann W Wägele; Marcell K Peters

    2011-01-01

    BACKGROUND: The use of DNA based methods for assessing biodiversity has become increasingly common during the last years. Especially in speciose biomes as tropical rain forests and/or in hyperdiverse or understudied taxa they may efficiently complement morphological approaches. The most successful molecular approach in this field is DNA barcoding based on cytochrome c oxidase I (COI) marker, but other markers are used as well. Whereas most studies aim at identifying or describing species, the...

  4. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  5. A new nuclear DNA marker from ubiquitin ligase gene region for genetic diversity detection of walnut germplasm resources

    Directory of Open Access Journals (Sweden)

    Zhili Suo

    2015-03-01

    Full Text Available Development of more sensitive nuclear DNA markers for identification of species, particularly closely allied taxa has been a challenging task that has attracted interest from scientists in fields of biotechnological development and genetic diversity detection. In this study, the sequence of the ubiquitin ligase gene (UBE3 region of nuclear DNA was tested for applicability and efficacy in revealing genetic diversity of walnut resources, with an emphasis on inter- and intra-specific levels. Analysis on genetic relationship among the taxa was conducted with the neighbor-joining (NJ method. The number of variable bases in the UBE3 region was 20 sites. All nine taxa (species/variety/cultivars were distinguished using the UBE3 sequence. In addition, each taxon was characterized molecularly with a unique nucleotide molecular formula using ten variable base sites derived from the nuclear DNA UBE3 gene sequence. This study presents a good complementary methodology for developing new DNA markers for identification of genus Juglans.

  6. Molecular markers of nuclear restoration gene Rf1 in sunflower using bulked segregant analysis-RAPD

    Institute of Scientific and Technical Information of China (English)

    季静; 王罡; E.Belhassen; H.Serieys; A.Berville

    1996-01-01

    Restoration of cytoplasmic male sterility (CMS) in sunflower was demonstrated to be controlled by polygenes by analysing 982 effective crosses among 109 self-crossed lines and 16 CMS lines. Two self-crossed lines and one CMS line with distinct genotypes were applied to creation of segregating populations for DNA bulks of the target gene Rfl. Bulked DNA was prepared in order to investigate single gene Rfl and its gene marker among polygenic characters at the same genetic background. Using 80 10-mer operon primers, 620 RAPD reactions were carried out between fertile and sterile DNA bulks. In about 800 loci, primary results showed that 8 were related to the restoration genes. Furthermore. 2 were confirmed as RAPD markers for gene Rfl by examining 9 maintenance and 7 restoration lines. This method is the improvement for bulked segregant analysis[1] with which markers of single gene of target can be identified rapidly among polygenic characters.

  7. Privacy, anonymity and subjectivity in genomic research.

    Science.gov (United States)

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729

  8. SSA-Caterpillar in Group Anonymity

    CERN Document Server

    Tavrov, Dan

    2011-01-01

    Nowadays, it is a common practice to protect various types of statistical data before publishing them for different researches. For instance, when conducting extensive demographic surveys such as national census, the collected data should be at least depersonalized to guarantee proper level of privacy preservation. In practice, even more complicated methods of data protection need to be used. All these methods can be generally divided into two classes. The first ones aim at providing individual data anonymity, whereas the other ones are focused on protecting information about a group of respondents. In this paper, we propose a novel technique of providing group anonymity in statistical data using singular spectrum analysis (SSA).Also, we apply SSA to defining hidden patterns in demographic data distribution.

  9. Privacy, anonymity and subjectivity in genomic research.

    Science.gov (United States)

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues.

  10. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  11. Graph Based Local Recoding for Data Anonymization

    Directory of Open Access Journals (Sweden)

    K. Venkata Ramana

    2013-08-01

    Full Text Available Releasing person specific data could potentially reveal the sensitive information of an individual. kanonymityis an approach for protecting the individual privacy where the data is formed into set ofequivalence classes in which each class share the same values. Among several methods, local recodingbased generalization is an effective method to accomplish k-anonymization. In this paper, we proposed aminimum spanning tree partitioning based approach to achieve local recoding. We achieve it in twophases. During the first phase, MST is constructed using concept hierarchical and the distances amongdata points are considered as the weights of MST and in the next phase we generate the equivalence classesadhering to the anonymity requirement. Experiments show that our proposed local recoding frameworkproduces better quality in published tables than existing Mondrian global recoding and k-memberclustering approaches.

  12. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  13. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  14. Assurances of past donor anonymity are meaningless

    OpenAIRE

    Blyth, Eric

    2005-01-01

    The New Scientist recently recounted the story of an American teenager conceived through ostensibly anonymous donor insemination who had been able to identify his donor through DNA testing and an internet genetic database service (also see BioNews issue 333, at http://www.bionews.org.uk/new.lasso?storyid=2808). In fact, we have known since Barry Stevens' remarkable documentary, Offspring, released in 2001, that with some genetic background information, access to DNA testing and the intern...

  15. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  16. Anonymity, Efficiency Wages and Technological Progress

    OpenAIRE

    Broadberry, Stephen; Ghosal, Sayantan; Proto, Eugenio

    2015-01-01

    Although the Industrial Revolution is often characterized as the culmination of a process of commercialisation, the precise nature of such a link remains unclear. This paper models and analyzes such link: the role of commercialisation in raising efficiency wages as impersonal and anonymous labour market transactions replace personalized customary relations. In the presence of an aggregate capital externality, we show that the resulting shift in relative factor prices leads to higher capital-i...

  17. EpCAM nuclear localization identifies aggressive Thyroid Cancer and is a marker for poor prognosis

    Directory of Open Access Journals (Sweden)

    MacMillan Christina

    2010-06-01

    Full Text Available Abstract Background Proteolytic cleavage of the extracellular domain (EpEx of Epithelial cell adhesion molecule (EpCAM and nuclear signaling by its intracellular oncogenic domain Ep-ICD has recently been implicated in increased proliferation of cancer cells. The clinical significance of Ep-ICD in human tumors remains an enigma. Methods EpEx, Ep-ICD and β-catenin immunohistochemistry using specific antibodies was conducted on 58 archived thyroid cancer (TC tissue blocks from 34 patients and correlated with survival analysis of these patients for up to 17 years. Results The anaplastic (ATC and aggressive thyroid cancers showed loss of EpEx and increased nuclear and cytoplasmic accumulation of Ep-ICD. In contrast, the low grade papillary thyroid cancers (PTC showed membranous EpEx and no detectable nuclear Ep-ICD. The ATC also showed concomitant nuclear expression of Ep-ICD and β-catenin. Kaplan-Meier Survival analysis revealed reduced overall survival (OS for TC patients showing nuclear Ep-ICD expression or loss of membranous EpEx (p Conclusion We report reciprocal loss of membrane EpEx but increased nuclear and cytoplasmic accumulation of Ep-ICD in aggressive TC; nuclear Ep-ICD correlated with poor OS of TC patients. Thus nuclear Ep-ICD localization may serve as a useful biomarker for aggressive TC and may represent a novel diagnostic, prognostic and therapeutic target for aggressive TC.

  18. The BitTorrent Anonymity Marketplace

    CERN Document Server

    Nielson, Seth James

    2011-01-01

    The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We propose a novel modification for BitTorrent that we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k swarms obscuring the actual intent of the participants. But because peers can cross-trade torrents, the k-1 cover traffic can actually serve a useful purpose. This creates a system wherein a neighbor cannot determine if a node actually wants a given torrent, or if it is only using it as leverage to get the one it really wants. In this paper, we present our design, explore its operation in simulation, and analyze its effectiveness. We demonstrate that the upload and download characteristics of c...

  19. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  20. Molecular authentication of the medicinal herb Ruta graveolens (Rutaceae) and an adulterant using nuclear and chloroplast DNA markers.

    Science.gov (United States)

    Al-Qurainy, F; Khan, S; Tarroum, M; Al-Hemaid, F M; Ali, M A

    2011-11-10

    Dried parts of different plant species often look alike, especially in powdered form, making them very difficult to identify. Ruta graveolens, sold as a dried medicinal herb, can be adulterated with Euphorbia dracunculoides. The genomic DNA was isolated from the leaf powder (100 mg each) using the modified CTAB method. Internal transcribed spacer sequences of nuclear ribosomal DNA (nrDNA-ITS), and chloroplast spacer sequences (rpoB and rpoC1) are regarded as potential genes for plant DNA barcoding. We amplified and sequenced these spacer sequences and confirmed the sequences with a BLAST search. Sequence alignment was performed using ClustalX to look for differences in the sequences. A DNA marker was developed based on rpoB and rpoC1 of the nrDNA-ITS for the identification of the adulterant E. dracunculoides in samples of R. graveolens that are sold in local herbal markets. Sequence-characterized amplified region markers of 289 and 264 bp for R. graveolens and 424 bp for E. dracunculoides were developed from dissimilar sequences of this nrDNA-ITS to speed up the authentication process. This marker successfully distinguished these species in extracted samples with as little as 5 ng DNA/μL extract.

  1. EpCAM nuclear localization identifies aggressive Thyroid Cancer and is a marker for poor prognosis

    International Nuclear Information System (INIS)

    Proteolytic cleavage of the extracellular domain (EpEx) of Epithelial cell adhesion molecule (EpCAM) and nuclear signaling by its intracellular oncogenic domain Ep-ICD has recently been implicated in increased proliferation of cancer cells. The clinical significance of Ep-ICD in human tumors remains an enigma. EpEx, Ep-ICD and β-catenin immunohistochemistry using specific antibodies was conducted on 58 archived thyroid cancer (TC) tissue blocks from 34 patients and correlated with survival analysis of these patients for up to 17 years. The anaplastic (ATC) and aggressive thyroid cancers showed loss of EpEx and increased nuclear and cytoplasmic accumulation of Ep-ICD. In contrast, the low grade papillary thyroid cancers (PTC) showed membranous EpEx and no detectable nuclear Ep-ICD. The ATC also showed concomitant nuclear expression of Ep-ICD and β-catenin. Kaplan-Meier Survival analysis revealed reduced overall survival (OS) for TC patients showing nuclear Ep-ICD expression or loss of membranous EpEx (p < 0.0004), median OS = 5 months as compared to 198 months for patients who did not show nuclear Ep-ICD or demonstrated only membranous EpE. We report reciprocal loss of membrane EpEx but increased nuclear and cytoplasmic accumulation of Ep-ICD in aggressive TC; nuclear Ep-ICD correlated with poor OS of TC patients. Thus nuclear Ep-ICD localization may serve as a useful biomarker for aggressive TC and may represent a novel diagnostic, prognostic and therapeutic target for aggressive TC

  2. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  4. Characterization of 10 New Nuclear Microsatellite Markers in Acca sellowiana (Myrtaceae

    Directory of Open Access Journals (Sweden)

    Gustavo H. F. Klabunde

    2014-06-01

    Full Text Available Premise of the study: Microsatellite primers were identified and characterized in Acca sellowiana in order to expand the limited number of pre-existing polymorphic markers for use in population genetic studies for conservation, phylogeography, breeding, and domestication. Methods and Results: A total of 10 polymorphic microsatellite primers were designed from clones obtained from a simple sequence repeat (SSR–enriched genomic library. The primers amplified di- and trinucleotide repeats with four to 27 alleles per locus. In all tested populations, the observed heterozygosity ranged from 0.269 to 1.0. Conclusions: These new polymorphic SSR markers will allow future genetic studies to be denser, either for genetic structure characterization of natural populations or for studies involving genetic breeding and domestication process in A. sellowiana.

  5. Clone identification in Japanese flowering cherry (Prunus subgenus Cerasus) cultivars using nuclear SSR markers.

    Science.gov (United States)

    Kato, Shuri; Matsumoto, Asako; Yoshimura, Kensuke; Katsuki, Toshio; Iwamoto, Kojiro; Tsuda, Yoshiaki; Ishio, Shogo; Nakamura, Kentaro; Moriwaki, Kazuo; Shiroishi, Toshihiko; Gojobori, Takashi; Yoshimaru, Hiroshi

    2012-09-01

    Numerous cultivars of Japanese flowering cherry (Prunus subgenus Cerasus) are recognized, but in many cases they are difficult to distinguish morphologically. Therefore, we evaluated the clonal status of 215 designated cultivars using 17 SSR markers. More than half the cultivars were morphologically distinct and had unique genotypes. However, 22 cultivars were found to consist of multiple clones, which probably originate from the chance seedlings, suggesting that their unique characteristics have not been maintained through propagation by grafting alone. We also identified 23 groups consisting of two or more cultivars with identical genotypes. Most members of these groups were putatively synonymously related and morphologically identical. However, some of them were probably derived from bud sport mutants and had distinct morphologies. SSR marker analysis provided useful insights into the clonal status of the examined Japanese flowering cherry cultivars and proved to be a useful tool for cultivar characterization. PMID:23226085

  6. Anonymity: an impediment to performance in healthcare.

    Science.gov (United States)

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  7. Anonymizing Binary Tables is APX-hard

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo

    2007-01-01

    The problem of publishing personal data without giving up privacy is increasingly important. An interesting formalization is the $k$-anonymization, where all rows in a table are clustered in sets of at least $k$ records, and all the entries for which records in the same cluster have different values are suppressed. The problem has been shown to be NP-hard when the records values are over a ternary alphabet and $k=3$. In this paper we show that the problem is not only NP-hard, but also APX-hard, when the records values are over a binary alphabet and $k=3$.

  8. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  9. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  10. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  11. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni;

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user.......g. redistribution of copy-righted contents, illegal drug trading and so on)....

  12. Congruent signals of population history but radically different patterns of genetic diversity between mitochondrial and nuclear markers in a mountain lizard.

    Science.gov (United States)

    Ferchaud, Anne-Laure; Eudeline, Rémy; Arnal, Véronique; Cheylan, Marc; Pottier, Gilles; Leblois, Raphaël; Crochet, Pierre-André

    2015-01-01

    Historical factors, current population size, population connectivity and selective processes at linked loci contribute to shaping contemporary patterns of neutral genetic diversity. It is now widely acknowledged that nuclear and mitochondrial markers react differently to current demography as well as to past history, so the use of both types of markers is often advocated to gain insight on both historical and contemporary processes. We used 12 microsatellite loci genotyped in 13 populations of a mountain lizard (Iberolacerta bonnali) to test whether the historical scenario favoured by a previous mitochondrial study was also supported by nuclear markers and thereby evaluated the consequences of postglacial range movements on nuclear diversity. Congruent signals of recent history were revealed by nuclear and mitochondrial markers using an Approximate Bayesian computation approach, but contemporary patterns of mtDNA and nuclear DNA diversity were radically different. Although dispersal in this species is probably highly restricted at all spatial scales, colonization abilities have been historically good, suggesting capability for reestablishment of locally extinct populations except in fully disconnected habitats.

  13. [Genetic variability and differentiation of three Russian populations of yellow potato cyst nematode Globodera rostochiensis as revealed by nuclear markers].

    Science.gov (United States)

    Khrisanfova, G G; Kharchevnikov, D A; Popov, I O; Zinov'eva, S V; Semenova, S K

    2008-05-01

    Genetic variability of yellow potato cyst nematode G. rostochiensis from three Russian populations (Karelia, Vladimir oblast, and Moscow oblast) was investigated using two types of nuclear markers. Using RAPD markers identified with the help of six random primers (P-29, OPA-10, OPT-14, OPA-11, OPB-11, and OPH-20), it was possible to distinguish Karelian population from the group consisting of the populations from two adjacent regions (Moscow oblast and Vladimir oblast). Based on the combined matrix, containing 294 RAPD fragments, dendrogram of genetic differences was constructed, and the indices of genetic divergence and partition (P, H, and G(st)), as well as the gene flow indices N(m) between the nematode samples examined, were calculated. The dendrogram structure, genetic diversity indices, and variations of genetic distances between single individuals in each population from Karelia and Central Russia pointed to genetic isolation and higher genetic diversity of the nematodes from Karelia. Based on polymorphism of rDNA first intergenic spacer ITS1, attribution of all populations examined to the species G. rostochiensis was proved. Small variations of the ITS1 sequence in different geographic populations of nematodes from different regions of the species world range did not allow isolation of separate groups within the species. Possible factors (including interregional transportations of seed potato) affecting nematode population structure in Russia are discussed. PMID:18672794

  14. Increased nuclear ?-catenin expression in oral potentially malignant lesions: A marker of epithelial dysplasia

    OpenAIRE

    Reyes Rojas, Montserrat; Rojas Alcayaga, Gonzalo; Maturana Ramírez, Andrea; Aitken Saavedra, Juan; Rojas, Carolina; Ortega Pinto, Ana Verónica

    2015-01-01

    Background Deregulation of ?-catenin is associated with malignant transformation; however, its relationship with potentially malignant and malignant oral processes is not fully understood. The aim of this study was to determine and compare the nuclear ?-catenin expression in oral dysplasia and oral squamous cell carcinoma (OSCC). Material and Methods Cross sectional study. Immunodetection of ?-catenin was performed on 72 samples, with the following distribution: 21 mild dysplasia, 12 moderate...

  15. Insights into Orphan Nuclear Receptors as Prognostic Markers and Novel Therapeutic Targets for Breast Cancer

    OpenAIRE

    Aesoy, Reidun; Clyne, Colin D.; Chand, Ashwini L

    2015-01-01

    There is emerging evidence asserting the importance of orphan nuclear receptors (ONRs) in cancer initiation and progression. In breast cancer, there is a lot unknown about ONRs in terms of their expression profile and their transcriptional targets in the various stages of tumor progression. With the classification of breast tumors into distinct molecular subtypes, we assess ONR expression in the different breast cancer subtypes and with patient outcomes. Complementing this, we review evidence...

  16. Online Piracy, Anonymity and Social Change – Deviance Through Innovation

    OpenAIRE

    Larsson, Stefan; Svensson, Måns; Kaminski, Marcin

    2012-01-01

    This article analyses current trends in the use of anonymity services among younger Swedes (15-25) and focuses on individuals engaging in illegal file sharing in order to better understand the rationale behind both file sharing as well as online anonymity, especially in relation to enforcement of copyright. By comparing the findings of a survey conducted on three different occasions (early 2009, late 2009 and early 2012), we measure the fluctuations in the use of anonymity services among appr...

  17. Identification of species-specific nuclear insertions of mitochondrial DNA (numts) in gorillas and their potential as population genetic markers.

    Science.gov (United States)

    Soto-Calderón, Iván Darío; Clark, Nicholas Jonathan; Wildschutte, Julia Vera Halo; DiMattio, Kelly; Jensen-Seaman, Michael Ignatius; Anthony, Nicola Mary

    2014-12-01

    The first hyper-variable region (HV1) of the mitochondrial control region (MCR) has been widely used as a molecular tool in population genetics, but inadvertent amplification of nuclear translocated copies of mitochondrial DNA (numts) in gorillas has compromised the use of mitochondrial DNA in population genetic studies. At least three putative classes (I, II, III) of gorilla-specific HV1 MCR numts have been uncovered over the past decade. However, the number, size and location of numt loci in gorillas and other apes are completely unknown. Furthermore, little work to date has assessed the utility of numts as candidate population genetic markers. In the present study, we screened Bacterial Artificial Chromosome (BAC) genomic libraries in the chimpanzee and gorilla to compare patterns of mitochondrial-wide insertion in both taxa. We conducted an intensive BLAST search for numts in the gorilla genome and compared the prevalence of numt loci originating from the MCR with other great ape taxa. Additional gorilla-specific MCR numts were retrieved either through BAC library screens or using an anchored-PCR (A-PCR) amplification using genomic DNA from five unrelated gorillas. Locus-specific primers were designed to identify numt insertional polymorphisms and evaluate their potential as population genetic markers. Mitochondrial-wide surveys of chimpanzee and gorilla BACs showed that the number of numts does not differ between these two taxa. However, MCR numts are more abundant in chimpanzees than in other great apes. We identified and mapped 67 putative gorilla-specific numts, including two that contain the entire HV1 domain, cluster with sequences from two numt classes (I, IIb) and will likely co-amplify with mitochondrial sequences using most published HV1 primers. However, phylogenetic analysis coupled with post-hoc analysis of mitochondrial variation can successfully differentiate nuclear sequences. Insertional polymorphisms were evident in three out of five numts

  18. Identification of species-specific nuclear insertions of mitochondrial DNA (numts) in gorillas and their potential as population genetic markers.

    Science.gov (United States)

    Soto-Calderón, Iván Darío; Clark, Nicholas Jonathan; Wildschutte, Julia Vera Halo; DiMattio, Kelly; Jensen-Seaman, Michael Ignatius; Anthony, Nicola Mary

    2014-12-01

    The first hyper-variable region (HV1) of the mitochondrial control region (MCR) has been widely used as a molecular tool in population genetics, but inadvertent amplification of nuclear translocated copies of mitochondrial DNA (numts) in gorillas has compromised the use of mitochondrial DNA in population genetic studies. At least three putative classes (I, II, III) of gorilla-specific HV1 MCR numts have been uncovered over the past decade. However, the number, size and location of numt loci in gorillas and other apes are completely unknown. Furthermore, little work to date has assessed the utility of numts as candidate population genetic markers. In the present study, we screened Bacterial Artificial Chromosome (BAC) genomic libraries in the chimpanzee and gorilla to compare patterns of mitochondrial-wide insertion in both taxa. We conducted an intensive BLAST search for numts in the gorilla genome and compared the prevalence of numt loci originating from the MCR with other great ape taxa. Additional gorilla-specific MCR numts were retrieved either through BAC library screens or using an anchored-PCR (A-PCR) amplification using genomic DNA from five unrelated gorillas. Locus-specific primers were designed to identify numt insertional polymorphisms and evaluate their potential as population genetic markers. Mitochondrial-wide surveys of chimpanzee and gorilla BACs showed that the number of numts does not differ between these two taxa. However, MCR numts are more abundant in chimpanzees than in other great apes. We identified and mapped 67 putative gorilla-specific numts, including two that contain the entire HV1 domain, cluster with sequences from two numt classes (I, IIb) and will likely co-amplify with mitochondrial sequences using most published HV1 primers. However, phylogenetic analysis coupled with post-hoc analysis of mitochondrial variation can successfully differentiate nuclear sequences. Insertional polymorphisms were evident in three out of five numts

  19. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...... model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...

  20. Expression of Putative Stem Cell Marker, Hepatocyte Nuclear Factor 4 Alpha, in Mammary Gland of Water Buffalo.

    Science.gov (United States)

    Choudhary, Ratan K; Choudhary, Shanti; Kaur, Harmanjot; Pathak, Devendra

    2016-01-01

    Buffaloes account for more than 56% of total milk production in India. Cyclic remodeling of mammary glands of human, mice, cow, sheep, and goat is determined by mammary stem cells. It is logical to assume that buffalo mammary gland will have mammary stem/progenitor cells. Thus far, no report exists on identification of buffalo mammary stem cells. Hepatocyte nuclear factor 4 alpha (HNF4A) is a candidate marker for hepatic progenitor cells and has recently been suggested as a marker of bovine mammary stem/progenitor cells. We hypothesized that ( 1 ) HNF4A identifies putative buffalo mammary stem/progenitor cells and ( 2 ) the number of HNF4A-positive cells increases during mastitis. Sixteen buffalo mammary samples were collected from a local slaughterhouse. Hematoxylin and eosin staining were performed on 5-micron thick sections and on the basis of gross examination and histomorphology of the mammary glands, physiological stages of the animals were estimated as non-lactating (n = 4), mastitis (n = 9), and prepubertal (n = 3). In total, 24048 cells were counted (5-10 microscopic fields/animal; n = 16 animals) of which, 40% cells were mammary epithelial cells (MEC) and 60% cells were the stromal cells. The percentage of MEC in non-lactating animals was higher compared to mastitic animals (47.3% vs. 37.3%), which was likely due to loss of MEC in mastitis. HNF4A staining was observed in nuclei of MEC of ducts, alveoli, and stromal cells. Basal location and low frequency of HNF4A-positive MEC (ranges from 0.4-4.5%) were consistent with stem cell characteristics. Preliminary study showed coexpression of HNF4A with MSI1 (a mammary stem cell marker in sheep), suggesting HNF4A was likely to be a putative mammary stem/progenitor cell marker in buffalo. HNF4A-positive MEC (basal and luminal; light and dark stained) tended to be higher in non-lactating than the mastitic animals (8.73 ± 1.71% vs. 4.29 ± 1.19%; P = 0.07). The first hypothesis that HNF4A identify

  1. The orphan COUP-TF nuclear receptors are markers for neurogenesis from cnidarians to vertebrates

    OpenAIRE

    Gauchat-Feiss, Dominique Madeleine; Escriva, Hector; Miljkovic-Licina, Marijana; Chera, Simona; Langlois, Marie-Claire; Begue, Agnès; Laudet, Vincent; Galliot, Brigitte

    2004-01-01

    In bilaterians, COUP-TF nuclear receptors participate in neurogenesis and/or CNS patterning. In hydra, the nervous system is formed of sensory mechanoreceptor cells (nematocytes) and neuronal cells, both lineages deriving from a common stem cell. The hydra COUP-TF gene, hyCOUP-TF, which encodes highly conserved DNA-binding and ligand-binding domains, belongs to the monophyletic COUP-TFs orphan receptor family (NR2F). In adult polyps, hyCOUP-TF is expressed in nematoblasts and a subset of neur...

  2. Nuclear markers reveal unexpected genetic variation and a Congolese-Nilotic origin of the Lake Victoria cichlid species flock.

    Science.gov (United States)

    Seehausen, Ole; Koetsier, Egbert; Schneider, Maria Victoria; Chapman, Lauren J; Chapman, Colin A; Knight, Mairi E; Turner, George F; van Alphen, Jacques J M; Bills, Roger

    2003-01-22

    Phylogenetic analyses based on mitochondrial (mt) DNA have indicated that the cichlid species flock of the Lake Victoria region is derived from a single ancestral species found in East African rivers, closely related to the ancestor of the Lake Malawi cichlid species flock. The Lake Victoria flock contains ten times less mtDNA variation than the Lake Malawi radiation, consistent with current estimates of the ages of the lakes. We present results of a phylogenetic investigation using nuclear (amplified fragment length polymorphism) markers and a wider coverage of riverine haplochromines. We demonstrate that the Lake Victoria-Edward flock is derived from the morphologically and ecologically diverse cichlid genus Thoracochromis from the Congo and Nile, rather than from the phenotypically conservative East African Astatotilapia. This implies that the ability to express much of the morphological diversity found in the species flock may by far pre-date the origin of the flock. Our data indicate that the nuclear diversity of the Lake Victoria-Edward species flock is similar to that of the Lake Malawi flock, indicating that the genetic diversity is considerably older than the 15 000 years that have passed since the lake began to refill. Most of this variation is manifested in trans-species polymorphisms, indicating very recent cladogenesis from a genetically very diverse founder stock. Our data do not confirm strict monophyly of either of the species flocks, but raise the possibility that these flocks have arisen from hybrid swarms. PMID:12590750

  3. Prognostic value of cancer stem cell markers CD133, ALDH1 and nuclearβ-catenin in colon cancer

    Institute of Scientific and Technical Information of China (English)

    Eman H.Abdelbary; Hayam E.Rashed; Eman I.Ismail; Mohamed Abdelgawad

    2014-01-01

    Colon cancer is one of the most common human malignancies. Cancer stem cells (CSCs), despite being only a smal subset of cancer cells, have the capability to self renew and sustain the tumor. They also have the ability to proliferate. Multiple CSCs associated markers have been identified in colon cancer including CD133, ALDH1 andβ catenin. The aim of the work was to study the prognostic value of CSCs markers (CD133, ALDH1 andβ catenin), as wel as their rela tionship to clinicopathological features of colon cancer. Methods:CD133, ALDH1 andβ catenin proteins expression was as sessed immunohistochemical y in a series of colon cancers and their prognostic significance was evaluated. Results:CD133 expression showed significant relationship to tumor stage and lymph node metastasis (P value 0.004&<0.001 respectively), and near significant relationship to liver metastasis (P value 0.092). ALDH1 was significantly associated with tumor grade, stage and nodal metastasis (P value 0.021, 0.001 and 0.026 respectively), but its relationship to liver metastasis was near sig nificant (P value 0.068). Nuclearβ catenin was significantly related to tumor grade, stage, nodal and liver metastasis (P value 0.001,<0.001,<0.001 and 0.008 respectively). Overal survival (OS) was associated inversely with CD133, ALDH1 positivity, and directly with nuclearβ catenin positivity (P value<0.001, 0.0001 and<0.001 respectively). Also recurrence free survival (RFS) was associated inversely with CD133, ALDH1 and directly with nuclearβ catenin positivity (P value 0.0001, 0.001 and<0.001 respectively). Conclusion:CD133, ALDH1 andβ catenin expressions of tumor cells have significant impact upon malignant progression of colon cancer and thus patient survival and tumor recurrence. Hence they can be used to predict outcome of colon cancer patients.

  4. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  5. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    Science.gov (United States)

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  6. Genetic diversity of Greek Aegilops species using different types of nuclear genome markers.

    Science.gov (United States)

    Thomas, Konstantinos G; Bebeli, Penelope J

    2010-09-01

    Random Amplified Polymorphic DNA (RAPD) and Inter-Simple Sequence Repeat (ISSR) analyses were used to evaluate genetic variability and relationships of Greek Aegilops species. Thirty-eight accessions of seven Greek Aegilops species [Ae. triuncialis (genome UC), Ae. neglecta (UM), Ae. biuncialis (UM), Ae. caudata (C), Ae. comosa (M), Ae. geniculata (MU) and Ae. umbellulata (U)] as well as Triticum accessions were studied. Nineteen RAPD and ten ISSR primers yielded 344 and 170 polymorphic bands, respectively, that were used for the construction of dendrograms. Regardless of the similarity coefficient and marker type used, UPGMA placed 38 Aegilops accessions into one branch while the other branch consisted of wheat species. Within the Aegilops cluster, subgroups were identified that included species that shared the same genome or belonged to the same botanical section. Within the Triticum cluster, two robust subgroups were formed, one including diploid wheat and another including polyploid wheat. In conclusion, results showed that there is genetic diversity in the Greek Aegilops species studied, and clustering based on genetic similarities was in agreement with botanical classifications.

  7. Phylogeography of the common vampire bat (Desmodus rotundus: Marked population structure, Neotropical Pleistocene vicariance and incongruence between nuclear and mtDNA markers

    Directory of Open Access Journals (Sweden)

    Morgante João S

    2009-12-01

    Full Text Available Abstract Background The common vampire bat Desmodus rotundus is an excellent model organism for studying ecological vicariance in the Neotropics due to its broad geographic range and its preference for forested areas as roosting sites. With the objective of testing for Pleistocene ecological vicariance, we sequenced a mitocondrial DNA (mtDNA marker and two nuclear markers (RAG2 and DRB to try to understand how Pleistocene glaciations affected the distribution of intraspecific lineages in this bat. Results Five reciprocally monophyletic clades were evident in the mitochondrial gene tree, and in most cases with high bootstrap support: Central America (CA, Amazon and Cerrado (AMC, Pantanal (PAN, Northern Atlantic Forest (NAF and Southern Atlantic Forest (SAF. The Atlantic forest clades formed a monophyletic clade with high bootstrap support, creating an east/west division for this species in South America. On the one hand, all coalescent and non-coalescent estimates point to a Pleistocene time of divergence between the clades. On the other hand, the nuclear markers showed extensive sharing of haplotypes between distant localities, a result compatible with male-biased gene flow. In order to test if the disparity between the mitochondrial and nuclear markers was due to the difference in mutation rate and effective size, we performed a coalescent simulation to examine the feasibility that, given the time of separation between the observed lineages, even with a gene flow rate close to zero, there would not be reciprocal monophyly for a neutral nuclear marker. We used the observed values of theta and an estimated mutation rate for the nuclear marker gene to perform 1000 iterations of the simulation. The results of this simulation were inconclusive: the number of iterations with and without reciprocal monophyly of one or more clades are similar. Conclusions We therefore conclude that the pattern exhibited by the common vampire bat, with marked

  8. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    Science.gov (United States)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  9. P-Sensitive K-Anonymity with Generalization Constraints

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2010-08-01

    Full Text Available Numerous privacy models based on the k-anonymity property and extending the k-anonymity model have been introduced in the last few years in data privacy research: l-diversity, p-sensitive k-anonymity, (a, k anonymity, t-closeness, etc. While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole. We consider a new approach, where requirements on the amount of distortion allowed on the initial data are imposed in order to preserve its usefulness. Our approach consists of specifying quasiidentifiers' generalization constraints, and achieving p-sensitive k-anonymity within the imposed constraints. We think that limiting the amount of allowed generalization when masking microdata is indispensable for real life datasets and applications. In this paper, the constrained p-sensitive k-anonymity model is introduced and an algorithm for generating constrained p-sensitive k-anonymous microdata is presented. Our experiments have shown that the proposed algorithm is comparable with existing algorithms used for generating p-sensitive k-anonymity with respect to the results' quality, and obviously the obtained masked microdata complies with the generalization constraints as indicated by the user.

  10. Population genetic structure of sexual and parthenogenetic damselflies inferred from mitochondrial and nuclear markers.

    Science.gov (United States)

    Lorenzo-Carballa, M O; Hadrys, H; Cordero-Rivera, A; Andrés, J A

    2012-04-01

    It has been postulated that obligate asexual lineages may persist in the long term if they escape from negative interactions with either sexual lineages or biological enemies; and thus, parthenogenetic populations will be more likely to occur in places that are difficult for sexuals to colonize, or those in which biological interactions are rare, such as islands or island-like habitats. Ischnura hastata is the only known example of natural parthenogenesis within the insect order Odonata, and it represents also a typical example of geographic parthenogenesis, as sexual populations are widely distributed in North America, whereas parthenogenetic populations of this species have only been found at the Azores archipelago. In order to gain insight in the origin and distribution of parthenogenetic I. hastata lineages, we have used microsatellites, mitochondrial and nuclear DNA sequence data, to examine the population genetic structure of this species over a wide geographic area. Our results suggest that sexual populations of I. hastata in North America conform to a large subdivided population that has gone through a recent spatial expansion. A recent single long distance dispersal event, followed by a demographic expansion, is the most parsimonious hypothesis explaining the origin of the parthenogenetic population of this species in the Azores islands. PMID:21915148

  11. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  12. Improving Security Architecture of Anonymous Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    As users of networks increasingly aware of their privacy needs, the importance of anonymity is gaining popularity. The reason behind it is that anonymity can hide the actual identity of end users while allowing their to access services of network or web site. More over they are allowed to do so...... without being traced. This usage is prevailing in P2P systems and also payment based networks like e-cash. Achieving anonymity and being able to trace misbehaving users are the two conflicting requirements. This paper proposes a security architecture that is aimed at providing complete anonymity to honest...... users while tracing misbehaving users thus resolving the conflict between anonymity and traceability requirements. In addition to these, this paper also focuses on basic security requirements such as nonrepudiation, data integrity, confidentiality, and authentication. The empirical results revealed that...

  13. Nuclear factor kappa B: A marker of chemotherapy for human stage IV gastric carcinoma

    Institute of Scientific and Technical Information of China (English)

    Sheng Ye; You-Ming Long; Jian Rong; Wen-Rui Xie

    2008-01-01

    AIM: To detect the nuclear factor kappa B (NF-κB) condition in human stage IV gastric carcinoma patients and to explore the correlation between NF-κB activation and survival of these patients after chemotherapy. METHODS: Expression of NF-κB-p65 was determined by immunohistochemical analysis.Activity of NF-κB DNA-binding in carcinoma tissue was detected by electrophoretic mobility shift assay.Kaplan-Meier survival analysis was performed to show the relation between NF-κB and progression-free survival (PFS) or overall survival (OS) of the patients.RESULTS: The positive expression rate of NF-κB-p65 in 60 gastric cancer tissue samples was 76.7%(46/60).The expression of NF-κB-p65 was reduced in adjacent carcinoma and normal tissue samples.Electrophoretic mobility shift assay (EMSA) analysis showed a strong activation of NF-κB in cancer tissue samples.A survival difference was found in NF-κB-p65 positive and negative patients.NF-κB-p65 expression was negative in cancer tissue samples(n = 14).PFS was 191.40 ±59.88 d and 152.93 ±16.99 d,respectively,in patients with positive NF-κB-p65 expression (n = 46) (P = 0.4028).The survival time of patients with negative and positive NF-κB-p65 expression was 425.16 ± 61.61 d and 418.85 ± 42.98 d,respectively (P = 0.7303).Kaplan-Meier analysis showed no significant difference in PFS or OS.The 46 patient tissue which positive NF-κB-p65 expression was found in the tissue samples from the 46 patients whose PFS and OS were 564.89± 75.94 d and s 352.37 ± 41.32 d,respectively (P =0.0165).CONCLUSION: NF-κB is activated in gastric carcinoma tissue,which is related to the OS after chemotherapy.

  14. Characterization of Fasciola spp. in Myanmar on the basis of spermatogenesis status and nuclear and mitochondrial DNA markers.

    Science.gov (United States)

    Ichikawa, Madoka; Bawn, Saw; Maw, Ni Ni; Htun, Lat Lat; Thein, Myint; Gyi, Aung; Sunn, Kyaw; Katakura, Ken; Itagaki, Tadashi

    2011-12-01

    Fasciola spp. in Myanmar were characterized on the basis of spermatogenesis status and DNA markers of nuclear internal transcribed spacer 1 (ITS1) and mitochondrial NADH dehydrogenase subunit 1 (nad1). We collected 88 adult flukes from Yangon, Lashio, and Myitkyina. Spermatogenesis status was analyzed by the presence of sperm in the seminal vesicles, and 8 aspermic and 80 spermic flukes were detected. The flukes were identified on the basis of spermatogenesis status and ITS1 types which were analyzed by a PCR-RFLP method, and 80 spermic flukes were identified as F. gigantica. A very low detection rate of aspermic Fasciola sp. indicated that they are not established in Myanmar. In phylogenetic analyses, the 7 aspermic Fasciola sp. from Myitkyina displayed a haplotype in nad1 sequence, which was identical to that of aspermic Fasciola sp. from other Asian countries including China. Therefore, they were probably introduced from China through an infected domestic ruminant. On the other hand, 17 nad1 haplotypes detected in F. gigantica belonged to 2 clades unique to Myanmar, each with a distinct founder haplotype in a network analysis. This indicated a unique history of F. gigantica introduction into Myanmar involving ancient artificial movements of domestic ruminants.

  15. Identification of nuclear phosphoproteins as novel tobacco markers in mouse lung tissue following short-term exposure to tobacco smoke

    Directory of Open Access Journals (Sweden)

    Kanako Niimori-Kita

    2014-01-01

    Full Text Available Smoking is a risk factor for lung diseases, including chronic obstructive pulmonary disease and lung cancer. However, the molecular mechanisms mediating the progression of these diseases remain unclear. Therefore, we sought to identify signaling pathways activated by tobacco-smoke exposure, by analyzing nuclear phosphoprotein expression using phosphoproteomic analysis of lung tissue from mice exposed to tobacco smoke. Sixteen mice were exposed to tobacco smoke for 1 or 7 days, and the expression of phosphorylated peptides was analyzed by mass spectrometry. A total of 253 phosphoproteins were identified, including FACT complex subunit SPT16 in the 1-day exposure group, keratin type 1 cytoskeletal 18 (K18, and adipocyte fatty acid-binding protein, in the 7-day exposure group, and peroxiredoxin-1 (OSF3 and spectrin β chain brain 1 (SPTBN1, in both groups. Semi-quantitative analysis of the identified phosphoproteins revealed that 33 proteins were significantly differentially expressed between the control and exposed groups. The identified phosphoproteins were classified according to their biological functions. We found that the identified proteins were related to inflammation, regeneration, repair, proliferation, differentiation, morphogenesis, and response to stress and nicotine. In conclusion, we identified proteins, including OSF3 and SPTBN1, as candidate tobacco smoke-exposure markers; our results provide insights into the mechanisms of tobacco smoke-induced diseases.

  16. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  17. Nuclear factor XIIIa staining (clone AC-1A1 mouse monoclonal) is a sensitive and specific marker to discriminate sebaceous proliferations from other cutaneous clear cell neoplasms.

    Science.gov (United States)

    Uhlenhake, Elizabeth E; Clark, Lindsey N; Smoller, Bruce R; Shalin, Sara C; Gardner, Jerad M

    2016-08-01

    Sebaceous carcinoma is a rare but serious malignancy that may be difficult to diagnose when poorly differentiated. Other epithelial tumors with clear cell change may mimic sebaceous carcinoma. Few useful or specific immunohistochemical markers for sebaceous differentiation are available. Nuclear staining with factor XIIIa (clone AC-1A1) was recently found to be a highly sensitive marker of sebaceous differentiation. We evaluated nuclear factor XIIIa (AC-1A1) staining in sebaceous neoplasms vs. other cutaneous clear cell tumors. We stained 27 sebaceous proliferations: sebaceous hyperplasia (7), sebaceous adenoma (8), sebaceoma (5), sebaceous carcinoma (7). We also stained 67 tumors with clear cell change: basal cell carcinoma (8), squamous cell carcinoma (8), hidradenoma (7), desmoplastic trichilemmoma (2), trichilemmoma (10), trichilemmal carcinoma (3), clear cell acanthoma (9), atypical fibroxanthoma (1), syringoma (8), trichoepithelioma (1), metastatic renal cell carcinoma (2), and nevi with balloon cell change (8). Nuclear factor XIIIa (AC-1A1) staining was present in 100% of sebaceous proliferations; 96% displayed strong staining. Non-sebaceous clear cell tumors were negative or only weakly positive with factor XIIIa (AC-1A1) in 95.5%; only 4.5% showed strong staining. This suggests that strong nuclear factor XIIIa (AC-1A1) staining is a sensitive and specific marker of sebaceous neoplasms vs. other clear cell tumors.

  18. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs

    Institute of Scientific and Technical Information of China (English)

    Ying-pu Deng; Li-feng Guo; Mu-lan Liu

    2007-01-01

    In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let υ(t, ω, q) denote the minimum size of the set of shares of a perfect anonymous (t, ω) threshold secret sharing scheme with q secrets. In this paper we prove that υ(t, ω, q) = Θ(q) if t and ω are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.

  19. A NEW ANONYMITY CONTROLLED E-CASH SCHEME

    Institute of Scientific and Technical Information of China (English)

    Zhang Fangguo; Wang Changjie; Wang Yumin

    2002-01-01

    E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.

  20. No more time to stay 'single' in the detection of Anisakis pegreffii, A. simplex (s. s.) and hybridization events between them: a multi-marker nuclear genotyping approach.

    Science.gov (United States)

    Mattiucci, S; Acerra, V; Paoletti, M; Cipriani, P; Levsen, A; Webb, S C; Canestrelli, D; Nascetti, G

    2016-07-01

    A multi-marker nuclear genotyping approach was performed on larval and adult specimens of Anisakis spp. (N = 689) collected from fish and cetaceans in allopatric and sympatric areas of the two species Anisakis pegreffii and Anisakis simplex (s. s.), in order to: (1) identify specimens belonging to the parental taxa by using nuclear markers (allozymes loci) and sequence analysis of a new diagnostic nuclear DNA locus (i.e. partial sequence of the EF1 α-1 nDNA region) and (2) recognize hybrid categories. According to the Bayesian clustering algorithms, based on those markers, most of the individuals (N = 678) were identified as the parental species [i.e. A. pegreffii or A. simplex (s. s.)], whereas a smaller portion (N = 11) were recognized as F1 hybrids. Discordant results were obtained when using the polymerase chain reaction-restriction fragment length polymorphisms (PCR-RFLPs) of the internal transcribed spacer (ITS) ribosomal DNA (rDNA) on the same specimens, which indicated the occurrence of a large number of 'hybrids' both in sympatry and allopatry. These findings raise the question of possible misidentification of specimens belonging to the two parental Anisakis and their hybrid categories derived from the application of that single marker (i.e. PCR-RFLPs analysis of the ITS of rDNA). Finally, Bayesian clustering, using allozymes and EF1 α-1 nDNA markers, has demonstrated that hybridization between A. pegreffii and A. simplex (s. s.) is a contemporary phenomenon in sympatric areas, while no introgressive hybridization takes place between the two species.

  1. No more time to stay 'single' in the detection of Anisakis pegreffii, A. simplex (s. s.) and hybridization events between them: a multi-marker nuclear genotyping approach.

    Science.gov (United States)

    Mattiucci, S; Acerra, V; Paoletti, M; Cipriani, P; Levsen, A; Webb, S C; Canestrelli, D; Nascetti, G

    2016-07-01

    A multi-marker nuclear genotyping approach was performed on larval and adult specimens of Anisakis spp. (N = 689) collected from fish and cetaceans in allopatric and sympatric areas of the two species Anisakis pegreffii and Anisakis simplex (s. s.), in order to: (1) identify specimens belonging to the parental taxa by using nuclear markers (allozymes loci) and sequence analysis of a new diagnostic nuclear DNA locus (i.e. partial sequence of the EF1 α-1 nDNA region) and (2) recognize hybrid categories. According to the Bayesian clustering algorithms, based on those markers, most of the individuals (N = 678) were identified as the parental species [i.e. A. pegreffii or A. simplex (s. s.)], whereas a smaller portion (N = 11) were recognized as F1 hybrids. Discordant results were obtained when using the polymerase chain reaction-restriction fragment length polymorphisms (PCR-RFLPs) of the internal transcribed spacer (ITS) ribosomal DNA (rDNA) on the same specimens, which indicated the occurrence of a large number of 'hybrids' both in sympatry and allopatry. These findings raise the question of possible misidentification of specimens belonging to the two parental Anisakis and their hybrid categories derived from the application of that single marker (i.e. PCR-RFLPs analysis of the ITS of rDNA). Finally, Bayesian clustering, using allozymes and EF1 α-1 nDNA markers, has demonstrated that hybridization between A. pegreffii and A. simplex (s. s.) is a contemporary phenomenon in sympatric areas, while no introgressive hybridization takes place between the two species. PMID:27046418

  2. Design and analysis of two-layer anonymous communication system

    Institute of Scientific and Technical Information of China (English)

    WANG Wei-ping; WANG Jian-xin

    2007-01-01

    A new architecture for scalable anonymous communication system(SACS) was proposed. The users were divided into several subgroups managed by different sub-blenders, and all sub-blenders were managed by the main-blender using two layers management scheme. The identity information of members are distributed on different sub-blenders, which makes each member keep much less information and network overload greatly reduce. The anonymity and the overhead of the new scheme were analyzed and compared with that of Crowds, which shows the cost of storage and network overhead for the new scheme largely decreases while the anonymity is little degraded. The experiment results also show that the new system architecture is well scalable. The ratio of management cost of SACS to that of Crowds is about 1:25 while the value of P(I|H1+) only increases by 0.001-0.020, which shows that SACS keeps almost the same anonymity with Crowds.

  3. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  4. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  5. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  6. On the Feasibility of (Practical Commercial Anonymous Cloud Storage

    Directory of Open Access Journals (Sweden)

    Tobias Pulls

    2015-08-01

    Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.

  7. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    OpenAIRE

    R. KALPANA; N. Rengarajan

    2012-01-01

    Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms an...

  8. Anonymization of DICOM Electronic Medical Records for Radiation Therapy

    OpenAIRE

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert (British painter, ca.1730-1791); Halloran, Andy; Zhang, Rui

    2014-01-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a can...

  9. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  10. Nuclear factor erythroid-2 related factor 2 overexpressed mesenchymal stem cells transplantation, improves renal function, decreases injuries markers and increases repair markers in glycerol-induced Acute kidney injury rats

    Science.gov (United States)

    Zhaleh, Fateme; Amiri, Fatemeh; Mohammadzadeh-Vardin, Mohammad; Bahadori, Marzie; Harati, Mitra Dehghan; Roudkenar, Mehryar Habibi; Saki, Sasan

    2016-01-01

    Objective(s): Recently cell therapy is a promising therapeutic modality for many types of disease including acute kidney injury (AKI). Due to the unique biological properties, mesenchymal stem cells (MSCs) are attractive cells in this regard. This study aims to transplant MSCs equipped with nuclear factor E2-related factor 2 (Nrf2) in rat experimental models of acute kidney and evaluate regeneration potential of injured kidney especially expression of injury and repaired biomarkers. Materials and methods: Nrf2 was overexpressed in bone marrow-derived MSCs by pcDNA.3.1 plasmid. AKI was induced using glycerol in rat models. The regenerative potential of Nrf2-overexpressed MSCs was evaluated in AKI-Induced animal models using biochemical and histological methods after transplantation. Expression of repaired genes, AQP1 and CK-18, as well as injury markers, Kim-1 and Cystatin C, was also assayed in engrafted kidney sections. Results: Our results revealed that transplantation of Nrf2-overexpressed MSCs into AKI-induced rats decreased blood urea nitrogen and creatinine and ameliorated kidney regeneration throughout 14 days. Upregulation of repaired markers and downregulation of injury markers were considerable 14 days after transplantation. Conclusions: Overexpression of Nrf2 in MSCs suggests a new strategy to increase efficiency of MSC-based cell therapy in AKI. PMID:27114803

  11. Prognostic value of receptor activator of nuclear factor kappa-B (RANK marker in patients with breast cancer

    Directory of Open Access Journals (Sweden)

    S. I. Zabroda

    2015-01-01

    Full Text Available Despite notable progress made in studying breast cancer (BC, the mechanisms of metastases, in view of the classification into molecular subtypes, in patients with BC remain to be fully uninvestigated, in the presence of a good prognosis in particular. To study novel diagnostic and predictive markers in a new way presents current problems in the pathology of BC. This investigation deals with the expression of osteoprotegerin (OPG in the tumor cells of patients with BC. It enrolled 83 patients with locally advanced BC (T2–4N0–3M0 who had been treated in 2003 to 2010. The inclusion criterion was a histologically verified diagnosis of invasive BC. To study the level of OPG, the investigators conducted an immunohistochemical study of biopsy sections according to the standard protocol. The mean expression of receptor activator of nuclear factor kappa-B (RANK in the BC cells was 18.7 %; itsmedian was 5 % (range, 0–90 %. The patients were divided into 2 groups according to the level of RANK expression: 1 high (higher than the median; 2 low (lower than the median. The high RANK group included 39 patients; the low RANK group comprised 44 patients. Analysis of the clinical and pathological characteristics of BC patients with regard RANK expression did not show any statistically significant differences in the presence or absence of affected regional lymph nodes, T category, and Ki-67 index. The analysis of clinical and pathomorphological and immunohistochemical characteristics in patients with breast cancer, taking into consideration RANK expression level, did not show any statistically significant differences with respect to presence or absence of affected regional lymph nodes, age, T category and Ki-67 index (р > 0.05. However, it revealed the following pattern: the high expression of RANK was more common in patients positive for estrogen and progesterone receptors than in those for negative receptors (p = 0.04.

  12. Spatial and temporal genetic structure of the planktonic Sagitta setosa (Chaetognatha) in European seas as revealed by mitochondrial and nuclear DNA markers.

    Science.gov (United States)

    Peijnenburg, K T C A; Fauvelot, C; Breeuwer, J A J; Menken, S B J

    2006-10-01

    Little is known about the spatial and temporal scales at which planktonic organisms are genetically structured. A previous study of mitochondrial DNA (mtDNA) in the holoplanktonic chaetognath Sagitta setosa revealed strong phylogeographic structuring suggesting that Northeast (NE) Atlantic, Mediterranean and Black Sea populations are genetically disjunct. The present study used a higher sampling intensity and a combination of mitochondrial and four microsatellite markers to reveal population structuring between and within basins. Between basins, both marker sets indicated significant differentiation confirming earlier results that gene flow is probably absent between the respective S. setosa populations. At the within-basin scale, we found no evidence of spatial or temporal structuring within the NE Atlantic. In the Mediterranean basin, both marker sets indicated significant structuring, but only the mtDNA data indicated a sharp genetic division between Adriatic and all other Mediterranean populations. Data were inconclusive about population structuring in the Black Sea. The levels of differentiation indicated by the two marker sets differed substantially, with far less pronounced structure detected by microsatellite than mtDNA data. This study also uncovered the presence of highly divergent mitochondrial lineages that were discordant with morphology, geography and nuclear DNA. We thus propose the hypothesis that highly divergent mitochondrial lineages may be present within interbreeding S. setosa populations. PMID:16968273

  13. Does anonymity increase the reporting of mental health symptoms?

    Directory of Open Access Journals (Sweden)

    Fear Nicola T

    2012-09-01

    Full Text Available Abstract Background There is no doubt that the perceived stigma of having a mental disorder acts as a barrier to help seeking. It is possible that personnel may be reluctant to admit to symptoms suggestive of poor mental health when such data can be linked to them, even if their personal details are only used to help them access further care. This may be particularly relevant because individuals who have a mental health problem are more likely to experience barriers to care and hold stigmatizing beliefs. If that is the case, then mental health screening programmers may not be effective in detecting those most in need of care. We aimed to compare mental health symptom reporting when using an anonymous versus identifiable questionnaire among UK military personnel on deployment in Iraq. Methods Survey among UK military personnel using two questionnaires, one was anonymous (n = 315 and one collected contact details (i.e. identifiable, n = 296. Distribution was by alternate allocation. Data were collected in Iraq during January-February 2009. Results No significant difference in the reporting of symptoms of common mental disorders was found (18.1% of identifiable vs. 22.9% of anonymous participants. UK military personnel were more likely to report sub-threshold and probable PTSD when completing questionnaires anonymously (sub-threshold PTSD: 2.4% of identifiable vs. 5.8% of anonymous participants; probable PTSD: 1.7% of identifiable vs. 4.8% of anonymous participants. Of the 11 barriers to care and perceived social stigma statements considered, those completing the anonymous questionnaire compared to those completing the identifiable questionnaire were more likely to endorse three statements: “leaders discourage the use of mental health services” (9.3% vs. 4.6%, “it would be too embarrassing” (41.6% vs. 32.5% and “I would be seen as weak” (46.6% vs. 34.2%. Conclusions We found a significant effect on the reporting of sub

  14. Restricted common data in anonymous E-cash system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang-jun; CHEN Ke-fei

    2006-01-01

    Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don't break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.

  15. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  16. Anonymous pastoral care for problems pertaining to sexuality.

    Science.gov (United States)

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431

  17. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  18. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  19. An Effective Clustering Approach to Web Query Log Anonymization

    CERN Document Server

    Fard, Amin Milani

    2010-01-01

    Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries. These privacy concerns go far beyond removing explicitly identifying information such as name and address, since non-identifying personal data can be combined with publicly available information to pinpoint to an individual. In this work we model web query logs as unstructured transaction data and present a novel transaction anonymization technique based on clustering and generalization techniques to achieve the k-anonymity privacy. We conduct extensive experiments on the AOL query log data. Our results show that this method results in a higher data utility compared to the state of-the-art transaction anonymization methods.

  20. Applying l-Diversity in anonymizing collaborative social network

    CERN Document Server

    Prasad, Ajay; Mitra, A; Singh, Arjun; Gour, Deepak

    2010-01-01

    To date publish of a giant social network jointly from different parties is an easier collaborative approach. Agencies and researchers who collect such social network data often have a compelling interest in allowing others to analyze the data. In many cases the data describes relationships that are private and sharing the data in full can result in unacceptable disclosures. Thus, preserving privacy without revealing sensitive information in the social network is a serious concern. Recent developments for preserving privacy using anonymization techniques are focused on relational data only. Preserving privacy in social networks against neighborhood attacks is an initiation which uses the definition of privacy called k-anonymity. k-anonymous social network still may leak privacy under the cases of homogeneity and background knowledge attacks. To overcome, we find a place to use a new practical and efficient definition of privacy called ldiversity. In this paper, we take a step further on preserving privacy in ...

  1. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  2. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  3. On the Definitions of Anonymity for Ring Signatures

    Science.gov (United States)

    Ohkubo, Miyako; Abe, Masayuki

    This paper studies the relations among several definitions of anonymity for ring signature schemes in the same attack environment. It is shown that one intuitive and two technical definitions we consider are asymptotically equivalent, and the indistinguishability-based technical definition is the strongest, i. e., the most secure when achieved, when the exact reduction cost is taken into account. We then extend our result to the threshold case where a subset of members cooperate to create a signature. The threshold setting makes the notion of anonymity more complex and yields a greater variety of definitions. We explore several notions and observe certain relation does not seem hold unlike the simple single-signer case. Nevertheless, we see that an indistinguishability-based definition is the most favorable in the threshold case. We also study the notion of linkability and present a simple scheme that achieves both anonymity and linkability.

  4. Completely anonymous multi-recipient signcryption scheme with public verification.

    Directory of Open Access Journals (Sweden)

    Liaojun Pang

    Full Text Available Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  5. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  6. Anonymous authentication protocol for multi-services in wireless environments

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

  7. Identification of molecular markers linked to a new nuclear male-sterility gene ms7 in sunflower (Helianthus annuus L.)

    Science.gov (United States)

    Nuclear male sterility (NMS) is an important alternative system to the cytoplasm male sterility (CMS) in hybrid breeding programs because of its stable male sterility and abundant available restorer resources. For sunflower (Helianthus annuus L.), NMS 89-552, a nuclear male-sterile mutant induced by...

  8. A new technique for the quantitative assessment of 8-oxoguanine in nuclear DNA as a marker of oxidative stress. Application to dystrophin-deficient DMD skeletal muscles.

    Science.gov (United States)

    Nakae, Yoshiko; Stoward, Peter J; Bespalov, Ivan A; Melamede, Robert J; Wallace, Susan S

    2005-09-01

    This is the first report on the development of an immunohistochemical technique, combined with quantitative image analysis, for the assessment of oxidative stress quantitatively in nuclear DNA in situ, and its application to measure DNA damage in Duchenne muscular dystrophic (DMD) muscles. Three sequential staining procedures for cell nuclei, a cell marker, and a product of oxidative DNA damage, 8-oxoguanine (8-oxoG), were performed. First, the nuclei in muscle sections were stained with Neutral Red followed by the capture of their images with an image analysis system used for absorbance measurements. Second, the same sections were then immunostained for laminin in basement membranes as the cell marker. Next, the sections were treated with 2 N HCl to remove the bound Neutral Red and to denature tissue DNA. Third, the sections were immunostained for 8-oxoG in DNA, using diaminobenzidine (DAB) to reveal the antibody complex. This was followed by capture of the images of the immunostained sections as previously. The absorbances at 451.2 nm of bound Neutral Red and DAB polymer oxides, the final product of 8-oxoG immunostaining, were measured in the same myonuclei in the sections. Analysis of these absorbances permitted indices of the 8-oxoG content, independent of the nuclear densities, to be determined in nuclear DNA in single myofibres and myosatellite cells surrounded by basement membranes. We found that the mean index for the myonuclei in biceps brachii muscles of 2- to 7-year-old patients was 14% higher than that in age-matched normal controls. This finding of the increased oxidative stress in the myonuclei in young DMD muscles agrees with the previous reports of increased oxidative stress in the cytoplasm in the DMD myofibres and myosatellite cells. The present technique for the quantitative assessment of oxidative stress in nuclear DNA in situ is applicable not only in biomedical research but also in the development of effective drugs for degenerative diseases

  9. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  10. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  11. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  12. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  13. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  14. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  15. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  16. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  17. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    Science.gov (United States)

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  18. Online Role-Play: Anonymity, Engagement and Risk.

    Science.gov (United States)

    Bell, Maureen

    2001-01-01

    Discussion of role-play focuses on a case study of an asynchronous, anonymous online role-play at an Australian university within a WebCT bulletin board that was designed as an alternative to an existing face-to-face workshop to offer more flexible access for participants. Suggests further research needs. (Author/LRW)

  19. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  20. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  1. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  2. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731

  3. Nuclear species-diagnostic SNP markers mined from 454 amplicon sequencing reveal admixture genomic structure of modern citrus varieties.

    Directory of Open Access Journals (Sweden)

    Franck Curk

    Full Text Available Most cultivated Citrus species originated from interspecific hybridisation between four ancestral taxa (C. reticulata, C. maxima, C. medica, and C. micrantha with limited further interspecific recombination due to vegetative propagation. This evolution resulted in admixture genomes with frequent interspecific heterozygosity. Moreover, a major part of the phenotypic diversity of edible citrus results from the initial differentiation between these taxa. Deciphering the phylogenomic structure of citrus germplasm is therefore essential for an efficient utilization of citrus biodiversity in breeding schemes. The objective of this work was to develop a set of species-diagnostic single nucleotide polymorphism (SNP markers for the four Citrus ancestral taxa covering the nine chromosomes, and to use these markers to infer the phylogenomic structure of secondary species and modern cultivars. Species-diagnostic SNPs were mined from 454 amplicon sequencing of 57 gene fragments from 26 genotypes of the four basic taxa. Of the 1,053 SNPs mined from 28,507 kb sequence, 273 were found to be highly diagnostic for a single basic taxon. Species-diagnostic SNP markers (105 were used to analyse the admixture structure of varieties and rootstocks. This revealed C. maxima introgressions in most of the old and in all recent selections of mandarins, and suggested that C. reticulata × C. maxima reticulation and introgression processes were important in edible mandarin domestication. The large range of phylogenomic constitutions between C. reticulata and C. maxima revealed in mandarins, tangelos, tangors, sweet oranges, sour oranges, grapefruits, and orangelos is favourable for genetic association studies based on phylogenomic structures of the germplasm. Inferred admixture structures were in agreement with previous hypotheses regarding the origin of several secondary species and also revealed the probable origin of several acid citrus varieties. The developed species

  4. Nuclear species-diagnostic SNP markers mined from 454 amplicon sequencing reveal admixture genomic structure of modern citrus varieties.

    Science.gov (United States)

    Curk, Franck; Ancillo, Gema; Ollitrault, Frédérique; Perrier, Xavier; Jacquemoud-Collet, Jean-Pierre; Garcia-Lor, Andres; Navarro, Luis; Ollitrault, Patrick

    2015-01-01

    Most cultivated Citrus species originated from interspecific hybridisation between four ancestral taxa (C. reticulata, C. maxima, C. medica, and C. micrantha) with limited further interspecific recombination due to vegetative propagation. This evolution resulted in admixture genomes with frequent interspecific heterozygosity. Moreover, a major part of the phenotypic diversity of edible citrus results from the initial differentiation between these taxa. Deciphering the phylogenomic structure of citrus germplasm is therefore essential for an efficient utilization of citrus biodiversity in breeding schemes. The objective of this work was to develop a set of species-diagnostic single nucleotide polymorphism (SNP) markers for the four Citrus ancestral taxa covering the nine chromosomes, and to use these markers to infer the phylogenomic structure of secondary species and modern cultivars. Species-diagnostic SNPs were mined from 454 amplicon sequencing of 57 gene fragments from 26 genotypes of the four basic taxa. Of the 1,053 SNPs mined from 28,507 kb sequence, 273 were found to be highly diagnostic for a single basic taxon. Species-diagnostic SNP markers (105) were used to analyse the admixture structure of varieties and rootstocks. This revealed C. maxima introgressions in most of the old and in all recent selections of mandarins, and suggested that C. reticulata × C. maxima reticulation and introgression processes were important in edible mandarin domestication. The large range of phylogenomic constitutions between C. reticulata and C. maxima revealed in mandarins, tangelos, tangors, sweet oranges, sour oranges, grapefruits, and orangelos is favourable for genetic association studies based on phylogenomic structures of the germplasm. Inferred admixture structures were in agreement with previous hypotheses regarding the origin of several secondary species and also revealed the probable origin of several acid citrus varieties. The developed species-diagnostic SNP

  5. Nuclear species-diagnostic SNP markers mined from 454 amplicon sequencing reveal admixture genomic structure of modern citrus varieties.

    Science.gov (United States)

    Curk, Franck; Ancillo, Gema; Ollitrault, Frédérique; Perrier, Xavier; Jacquemoud-Collet, Jean-Pierre; Garcia-Lor, Andres; Navarro, Luis; Ollitrault, Patrick

    2015-01-01

    Most cultivated Citrus species originated from interspecific hybridisation between four ancestral taxa (C. reticulata, C. maxima, C. medica, and C. micrantha) with limited further interspecific recombination due to vegetative propagation. This evolution resulted in admixture genomes with frequent interspecific heterozygosity. Moreover, a major part of the phenotypic diversity of edible citrus results from the initial differentiation between these taxa. Deciphering the phylogenomic structure of citrus germplasm is therefore essential for an efficient utilization of citrus biodiversity in breeding schemes. The objective of this work was to develop a set of species-diagnostic single nucleotide polymorphism (SNP) markers for the four Citrus ancestral taxa covering the nine chromosomes, and to use these markers to infer the phylogenomic structure of secondary species and modern cultivars. Species-diagnostic SNPs were mined from 454 amplicon sequencing of 57 gene fragments from 26 genotypes of the four basic taxa. Of the 1,053 SNPs mined from 28,507 kb sequence, 273 were found to be highly diagnostic for a single basic taxon. Species-diagnostic SNP markers (105) were used to analyse the admixture structure of varieties and rootstocks. This revealed C. maxima introgressions in most of the old and in all recent selections of mandarins, and suggested that C. reticulata × C. maxima reticulation and introgression processes were important in edible mandarin domestication. The large range of phylogenomic constitutions between C. reticulata and C. maxima revealed in mandarins, tangelos, tangors, sweet oranges, sour oranges, grapefruits, and orangelos is favourable for genetic association studies based on phylogenomic structures of the germplasm. Inferred admixture structures were in agreement with previous hypotheses regarding the origin of several secondary species and also revealed the probable origin of several acid citrus varieties. The developed species-diagnostic SNP

  6. Nuclear nano-morphology markers of histologically normal cells detect the “field effect” of breast cancer

    OpenAIRE

    Bista, Rajan K.; Wang, Pin; Bhargava, Rohit; Uttam, Shikhar; Douglas J Hartman; Randall E Brand; Liu, Yang

    2012-01-01

    Accurate detection of breast malignancy from histologically normal cells (“field effect”) has significant clinical implications in a broad base of breast cancer management, such as high-risk lesion management, personalized risk assessment, breast tumor recurrence, and tumor margin management. More accurate and clinically applicable tools to detect markers characteristic of breast cancer “field effect” that are able to guide the clinical management are urgently needed. We have recently develop...

  7. Nuclear Import Analysis of Two Different Fluorescent Marker Proteins into Hepatocyte Cell Lines (HuH-7 Cell

    Directory of Open Access Journals (Sweden)

    Aris Haryanto

    2015-10-01

    Full Text Available The application of fluorescent proteins as expression markers and protein fusion partners has provedimmensely valuable for resolving the organization of biological events in living cells. EGFP and DsRed2 arecommonly fluorescent marker protein which is used for biotechnology and cell biology research. The presentstudy was designed to identify the expression vector that suitable to ligate with DNA encoding HBV coreprotein for intracellular localization study in hepatocyte cell, which were expressed as fusion proteins. We alsocompared and quantified the expressed fluorescent protein which predominantly localized in the cellcompartment. The results indicated that DsRed2 shown as less than ideal for intracellular localization study ofthan EGFP, because of its tetrameric structure of the fluorescent protein and when fused to a protein of interest,the fusion protein often forms aggregates in the living cells. In contrast, EGFP fluorescent protein shown a muchhigher proportion of cytoplasmic localization, thus being more suitable for analysis of intracellular localizationthan DsRed2 fluorescent protein. EGFP fluorescent protein is also capable to produce a strong green fluorescencewhen excited by blue light, without any exogenously added substrate or cofactor, events inside living cell canthus be visualized in a non-invasive way. Based on our present quantitative data and some reasons above shownthat EGFP is more suitable than DsRed2 as a fluorescent marker protein for intracellular localization study intoHuH-7 cell.Keywords: EGFP, DsRed2 fluorescent protein , HuH-7 cell, HBV, intracellular localization

  8. Comparative population genetic analysis of bocaccio rockfish Sebastes paucispinis using anonymous and gene-associated simple sequence repeat loci.

    Science.gov (United States)

    Buonaccorsi, Vincent P; Kimbrell, Carol A; Lynn, Eric A; Hyde, John R

    2012-01-01

    Comparative population genetic analyses of traditional and emergent molecular markers aid in determining appropriate use of new technologies. The bocaccio rockfish Sebastes paucispinis is a high gene-flow marine species off the west coast of North America that experienced strong population decline over the past 3 decades. We used 18 anonymous and 13 gene-associated simple sequence repeat (SSR) loci (expressed sequence tag [EST]-SSRs) to characterize range-wide population structure with temporal replicates. No F(ST)-outliers were detected using the LOSITAN program, suggesting that neither balancing nor divergent selection affected the loci surveyed. Consistent hierarchical structuring of populations by geography or year class was not detected regardless of marker class. The EST-SSRs were less variable than the anonymous SSRs, but no correlation between F(ST) and variation or marker class was observed. General linear model analysis showed that low EST-SSR variation was attributable to low mean repeat number. Comparative genomic analysis with Gasterosteus aculeatus, Takifugu rubripes, and Oryzias latipes showed consistently lower repeat number in EST-SSRs than SSR loci that were not in ESTs. Purifying selection likely imposed functional constraints on EST-SSRs resulting in low repeat numbers that affected diversity estimates but did not affect the observed pattern of population structure.

  9. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    OpenAIRE

    Youngsook Lee; Juryon Paik

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreig...

  10. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  11. Anonymous voting for multi-dimensional CV quantum system

    Science.gov (United States)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  12. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-06-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  13. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  14. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  15. FreeRec: an Anonymous and Distributed Personalization Architecture

    OpenAIRE

    Boutet, Antoine; Frey, Davide; Jégou, Arnaud; Kermarrec, Anne-Marie; Ribeiro, Heverson B.

    2013-01-01

    International audience; We present and evaluate FreeRec, an anonymous decentral- ized peer-to-peer architecture, designed to bring personalization while protecting the privacy of its users. FreeRec's decentralized approach makes it independent of any entity wishing to collect personal data about users. At the same time, its onion-routing-like gossip-based overlay protocols e ectively hide the association between users and their inter- est pro les without a ecting the quality of personalizatio...

  16. Discrimination and nepotism: the efficiency of the anonymity rule.

    OpenAIRE

    Fershtman, C.; Gneezy, U.; Verboven, Frank

    2002-01-01

    The Paper considers two categories of discrimination: ‘discrimination against’ and ‘discrimination in favour’, which Becker coins ‘nepotism’. The Paper develops an experimental test to distinguish between these two types of discrimination. The experiment compares the behaviour towards individuals of different groups with the behaviour towards anonymous individuals (those having no clear group affiliation). We illustrate the two attitudes by considering two segmented societies: Belgian society...

  17. Accountable Anonymous Service Usage in Mobile Communication Systems

    OpenAIRE

    Buttyan, Levente; Hubaux, Jean-Pierre

    1999-01-01

    We introduce a model that allows of anonymous yet accountable service usage in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We motivate the introduction of customer care agencies by analyzing their role and emphasizing their advantages. We introduce the general idea of ticket based service access, present a categorization of ticket types and ticket acquisi...

  18. Anonymity in a Limit-Order Market: An Experimental Analysis

    OpenAIRE

    Majois, Christophe

    2008-01-01

    In this paper, we adopt an experimental approach to evaluate the impact of pre-trade anonymity in order-driven markets. More specifically, we build an experimental design of an electronic limit-order market, and compare two settings: one in which traders observe the identities of agents placing orders in the order book, and the other one where this information is not available on market screens. We find that ID code disclosure does not alter liquidity, efficiency or traders’ pr...

  19. Guaranteeing anonymity when sharing medical data, the Datafly System.

    OpenAIRE

    Sweeney, L.

    1997-01-01

    We present a computer program named Datafly that maintains anonymity in medical data by automatically generalizing, substituting, and removing information as appropriate without losing many of the details found within the data. Decisions are made at the field and record level at the time of database access, so the approach can be used on the fly in role-based security within an institution, and in batch mode for exporting data from an institution. Often organizations release and receive medic...

  20. On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

    OpenAIRE

    Tobias Pulls; Daniel Slamanig

    2015-01-01

    Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous clo...

  1. Best-Reply Dynamics in Large Anonymous Games

    OpenAIRE

    Yakov Babichenko

    2012-01-01

    We consider small-influence anonymous games with a large number of players $n$ where every player has two actions. For this class of games we present a best-reply dynamic with the following two properties. First, the dynamic reaches Nash approximate equilibria fast (in at most $cn\\ log n$ steps for some constant $c>0$). Second, Nash approximate equilibria are played by the dynamic with a limit frequency of at least $1-e^{-c'n}$ for some constant $c'>0$.

  2. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  3. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    Nováková, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  4. Enhancing Censorship Resistance in the Tor Anonymity Network

    OpenAIRE

    Winter, Philipp

    2014-01-01

    Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterati...

  5. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  6. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  7. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

    Directory of Open Access Journals (Sweden)

    Maged Hamada Ibrahim

    2015-09-01

    Full Text Available In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

  8. Anonymous and Non-Repudiation E-Payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J. Aboud

    2007-01-01

    Full Text Available There are many proposals offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused by fraudulent to perform a perfect crimes. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the case of criminal entities. In the article we suggest an efficient protocol for e-payment scheme that offers a good level of security with appreciate to its efficiency. The proposed protocol prevents the blind office and the bank from impersonate an entity, so that the entity could not repudiate it when the entity misused a coin. Another benefit is that it is constructed from efficient cryptography schemes so that its security can simply be analyzed. The strength of this scheme is in its easiness. So, we claim that the suggested protocol is more efficient than the existing schemes, since it allows to both a blind office and a bank to impersonate an entity to find and to spend a coin without to be noticed. It might cause a repudiation difficulty where the entity can repudiate his bad activities by proposing that both the bank and the blind office acted inaccurately. Other relevant issues related to the new protocol will be discussed in the section of the security of the scheme.

  9. [E-research: problems with anonymity and consent].

    Science.gov (United States)

    Woolderink, Marla; van Asselt, Antoinette D I; van Schayck, Constant P; van Wijmen, Frans C B

    2013-01-01

    The Medical Research Involving Human Subjects Act (WMO) requires that participants in medical-scientific studies provide written consent. This requirement makes e-research (online research) unnecessarily difficult and sometimes impossible. Much of e-research involves online interventions that focus on sensitive issues such as sexual dysfunction, addiction and child abuse, for which anonymity is an important condition. WMO procedures, however, strictly interpret the word "written" as "on paper", and participants are not permitted to give consent by email, for example. A second requirement, which mainly makes studies among minors between the ages of 12 and 18 more difficult, is that both parents or the guardian must provide written consent. This undermines anonymity to such an extent that virtually no subjects remain. Participants in medical-scientific studies must always be identifiable to the investigator. But, apart from this, he/she should be possible to guarantee anonymity within the regulatory framework. There is good reason to adapt legal regulations to today's needs. PMID:24345359

  10. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  11. Utility-guided Clustering-based Transaction Data Anonymization

    Directory of Open Access Journals (Sweden)

    Aris Gkoulalas-Divanis

    2012-04-01

    Full Text Available Transaction data about individuals are increasingly collected to support a plethora of applications, spanning from marketing to biomedical studies. Publishing these data is required by many organizations, but may result in privacy breaches, if an attacker exploits potentially identifying information to link individuals to their records in the published data. Algorithms that prevent this threat by transforming transaction data prior to their release have been proposed recently, but they may incur significant utility loss due to their inability to: (i accommodate a range of different privacy requirements that data owners often have, and (ii guarantee that the produced data will satisfy data owners’ utility requirements. To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. Additionally, the second algorithm allows the specification and enforcement of utility requirements, thereby ensuring that the anonymized data remain useful in intended tasks. Experiments with both benchmark and real medical datasets verify that our algorithms significantly outperform the current state-of-the-art algorithms in terms of data utility, while being comparable in terms of efficiency.

  12. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  13. Post-Messinian evolutionary relationships across the Sicilian channel: Mitochondrial and nuclear markers link a new green toad from Sicily to African relatives

    Directory of Open Access Journals (Sweden)

    Lo Brutto Sabrina

    2008-02-01

    Full Text Available Abstract Background Little attention has been paid to the consequences of the last landbridge between Africa and Sicily on Mediterranean biogeography. Previous paleontological and scarce molecular data suggest possible faunal exchange later than the well-documented landbridge in the Messinian (5.3 My; however, a possible African origin of recent terrestrial Sicilian fauna has not been thoroughly tested with molecular methods. To gain insight into the phylogeography of the region, we examine two mitochondrial and two nuclear markers (one is a newly adapted intron marker in green toads (Bufo viridis subgroup across that sea barrier, the Strait of Sicily. Results Extensive sampling throughout the western Mediterranean and North Africa revealed a deep sister relationship between Sicilian (Bufo siculus n.sp. and African green toads (B. boulengeri on the mitochondrial and nuclear level. Divergence times estimated under a Bayesian-coalescence framework (mtDNA control region and 16S rRNA range from the Middle Pliocene (3.6 My to Pleistocene (0.16 My with an average (1.83 to 2.0 My around the Pliocene/Pleistocene boundary, suggesting possible land connections younger than the Messinian (5.3 My. We describe green toads from Sicily and some surrounding islands as a new endemic species (Bufo siculus. Bufo balearicus occurs on some western Mediterranean islands (Corsica, Sardinia, Mallorca, and Menorca and the Apennine Peninsula, and is well differentiated on the mitochondrial and nuclear level from B. siculus as well as from B. viridis (Laurenti, whose haplotype group reaches northeastern Italy, north of the Po River. Detection of Calabrian B. balearicus haplotypes in northeastern Sicily suggests recent invasion. Our data agree with paleogeographic and fossil data, which suggest long Plio-Pleistocene isolation of Sicily and episodic Pleistocene faunal exchange across the Strait of Messina. It remains unknown whether both species (B. balearicus, B. siculus

  14. Insights into genetic diversity, parentage, and group composition of Atlantic white-sided dolphins (Lagenorhynchus acutus) off the west of Ireland based on nuclear and mitochondrial genetic markers.

    Science.gov (United States)

    Mirimin, Luca; Banguera-Hinestroza, Eulalia; Dillane, Eileen; Hoelzel, Alan R; Cross, Tom F; Rogan, Emer

    2011-01-01

    The analysis of stranding events and the application of molecular markers can be powerful tools to study cryptic biological aspects of delphinid species that occur mainly in open ocean habitat. In the present study, we investigated nuclear and mitochondrial genetic variability of Atlantic white-sided dolphins that stranded from 1990 to 2006 (n = 42) along the west coast of Ireland, using 8 microsatellite loci and 599 bp of the mitochondrial DNA control region. Results from both classes of markers are concordant with the hypothesis of a large random-mating population of white-sided dolphins along the west coast of Ireland. In addition, the analyses of 2 live mass stranding events (19 and 5 individuals, respectively) revealed that dolphins within each group were mainly unrelated to each other, suggesting dispersal of both sexes from the natal group (i.e., no natal phylopatry). Parentage analyses allowed the identification of mother-offspring pairs but ruled out all adult males as possible fathers. In combination with data on age of individuals, these results confirmed previous knowledge on life-history parameters, with sexually mature females ranging between 11 and 15 years of age and an interbirth interval of at least 2 years. The present study provides novel information on population and group composition of Atlantic white-sided dolphins along the west coast of Ireland, where population and social structure of the species are still poorly understood. PMID:21059883

  15. Nuclear markers reveal unexpected genetic variation and a Congolese-Nilotic origin of the Lake Victoria cichlid species flock.

    OpenAIRE

    Seehausen, Ole; Koetsier, Egbert; Schneider, Maria Victoria; Chapman, Lauren J.; Colin A Chapman; Knight, Mairi E.; Turner, George F.; van Alphen, Jacques J.M; Bills, Roger

    2003-01-01

    Phylogenetic analyses based on mitochondrial (mt) DNA have indicated that the cichlid species flock of the Lake Victoria region is derived from a single ancestral species found in East African rivers, closely related to the ancestor of the Lake Malawi cichlid species flock. The Lake Victoria flock contains ten times less mtDNA variation than the Lake Malawi radiation, consistent with current estimates of the ages of the lakes. We present results of a phylogenetic investigation using nuclear (...

  16. Identification of species-specific nuclear insertions of mitochondrial DNA (numts) in gorillas and their potential as population genetic markers

    OpenAIRE

    Soto-Calderón, Iván Darío; Clark Nicholas, Jonathan; Wildschutte Julia, Vera Halo; DiMattio, Kelly; Jensen-Seaman, Michael Ignatius; Anthony, Nicola Mary

    2014-01-01

    The first hyper-variable region (HV1) of the mitochondrial control region (MCR) has been widely used as a molecular tool in population genetics, but inadvertent amplification of nuclear translocated copies of mitochondrial DNA (numts) in gorillas has compromised the use of mitochondrial DNA in population genetic studies. At least three putative classes (I, II, III) of gorilla-specific HV1 MCR numts have been uncovered over the past decade. However, the number, size and location of numt loci i...

  17. Concordance of nuclear and mitochondrial DNA markers in detecting a founder event in Lake Clark sockeye salmon

    Science.gov (United States)

    Ramstad, Kristina M.; Woody, Carol Ann; Habicht, Chris; Sage, G. Kevin; Seeb, James E.; Allendorf, Fred W.

    2007-01-01

    Genetic bottleneck effects can reduce genetic variation, persistence probability, and evolutionary potential of populations. Previous microsatellite analysis suggested a bottleneck associated with a common founding of sock-eye salmon Oncorhynchus nerka populations of Lake Clark, Alaska, about 100 to 400 generations ago. The common foundingevent occurred after the last glacial recession and resulted in reduced allelic diversity and strong divergence of Lake Clarksockeye salmon relative to neighboring Six Mile Lake and LakeIliamna populations. Here we used two additional genetic marker types (allozymes and mtDNA) to examine these patterns further. Allozyme and mtDNA results were congruent with the microsatellite data in suggesting a common founder event in LakeClark sockeye salmon and confirmed the divergence of Lake Clarkpopulations from neighboring Six Mile Lake and Lake Iliamna populations. The use of multiple marker types provided better understanding of the bottleneck in Lake Clark. For example, the Sucker Bay Lake population had an exceptionally severe reduction in allelic diversity at microsatellite loci, but not at mtDNA. This suggests that the reduced microsatellite variation in Sucker Bay Lake fish is due to consistently smaller effective population size than other Lake Clark populations, rather than a more acute or additional bottleneck since founding. Caution is urged in using reduced heterozygosity as a measure of genetic bottleneck effects because stochastic variance among loci resulted in an overall increase in allozyme heterozygosity within bottlenecked Lake Clark populations. However, heterozygosity excess, which assesses heterozygosity relative to allelic variation, detected genetic bottleneck effects in both allozyme and microsatellite loci. 

  18. The role of quasi-identifiers in k-anonymity revisited

    OpenAIRE

    Bettini, C.; Wang, X S; S. Jajodia

    2006-01-01

    The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly inform...

  19. Reidentification and k-anonymity: a model for disclosure risk in graphs

    OpenAIRE

    Stokes, Klara; Torra, Vicenç

    2011-01-01

    In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the n...

  20. Marker development

    Energy Technology Data Exchange (ETDEWEB)

    Adams, M.R.

    1987-05-01

    This report is to discuss the marker development for radioactive waste disposal sites. The markers must be designed to last 10,000 years, and place no undue burdens on the future generations. Barriers cannot be constructed that preclude human intrusion. Design specifications for surface markers will be discussed, also marker pictograms will also be covered.

  1. The implications of stigma and anonymity for self-disclosure in health blogs.

    Science.gov (United States)

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  2. The phylogenetic utility of chloroplast and nuclear DNA markers and the phylogeny of the Rubiaceae tribe Spermacoceae.

    Science.gov (United States)

    Kårehed, Jesper; Groeninckx, Inge; Dessein, Steven; Motley, Timothy J; Bremer, Birgitta

    2008-12-01

    The phylogenetic utility of chloroplast (atpB-rbcL, petD, rps16, trnL-F) and nuclear (ETS, ITS) DNA regions was investigated for the tribe Spermacoceae of the coffee family (Rubiaceae). ITS was, despite often raised cautions of its utility at higher taxonomic levels, shown to provide the highest number of parsimony informative characters, in partitioned Bayesian analyses it yielded the fewest trees in the 95% credible set, it resolved the highest proportion of well resolved clades, and was the most accurate region as measured by the partition metric and the proportion of correctly resolved clades (well supported clades retrieved from a combined analysis regarded as "true"). For Hedyotis, the nuclear 5S-NTS was shown to be potentially as useful as ITS, despite its shorter sequence length. The chloroplast region being the most phylogenetically informative was the petD group II intron. We also present a phylogeny of Spermacoceae based on a Bayesian analysis of the four chloroplast regions, ITS, and ETS combined. Spermacoceae are shown to be monophyletic. Clades supported by high posterior probabilities are discussed, especially in respect to the current generic classification. Notably, Oldenlandia is polyphyletic, the two subgenera of Kohautia are not sister taxa, and Hedyotis should be treated in a narrow sense to include only Asian species. PMID:18950720

  3. Phylogeny and biogeography of Poecilia (Cyprinodontiformes: Poeciliinae) across Central and South America based on mitochondrial and nuclear DNA markers.

    Science.gov (United States)

    Ho, Adeljean L F C; Pruett, Christin L; Lin, Junda

    2016-08-01

    Poeciliids are a diverse group of small Neotropical fishes, and despite considerable research attention as models in ecology and evolutionary biology, our understanding of their biogeographic and phylogenetic relationships is still limited. We investigated the phylogenetic relationships of South and Central American Poecilia, by examining 2395 base pairs of mitochondrial DNA (ATPase 8/6, COI) and nuclear DNA (S7) for 18 species across six subgenera. Fifty-eight novel sequences were acquired from newly collected specimens and 20 sequences were obtained from previously published material. Analyses of concatenated and partitioned mitochondrial DNA and nuclear DNA sets resulted in a well-supported phylogeny that resolved several monophyletic groups corresponding to previously hypothesized subgenera and species complexes. A divergence-dating analysis supported the hypothesis of the genus Poecilia dispersing into Central America in the early Pliocene (ancestors of Psychropoecilia+Allopoecilia+Mollienesia: 7.3-2.0Mya) from predominantly South America. Subsequently, one lineage (subgenus Allopoecilia: 5.1-1.3Mya) expanded deeper into South America from Lower-Central America, and one lineage expanded from Nuclear-Central America into South America (subgenus Mollienesia: 0.71-0.14Mya). The subgenus Mollienesia diverged into three monophyletic groups that can be identified by nuptial male dorsal fin morphology and inner jaw dentition. A subclade of the unicuspid short-fins (subgenus Mollienesia) was the lineage that expanded into South America during the middle Pleistocene. Species in this subclade are now distributed across northern South America, where they are partially sympatric with Allopoecilia. However the P. (A.) caucana complex was not monophyletic, with P. (A.) wandae clustering in the Mollienesia subclade that expanded into South America. It is apparent that characters (body size, scale count, pigmentation, and gonopodium morphology) used to define the P. (A

  4. Nuclear and mitochondrial DNA markers in traceability of retail beef samples Marcadores de DNA nuclear e mitocondrial para rastreabilidade da carne bovina comercializada

    Directory of Open Access Journals (Sweden)

    Aline S.M. Cesar

    2010-09-01

    Full Text Available Several characteristics are important in a traceability system of animal products, such as age at slaughter, breed composition, besides information of the productive chain. In general, the certification agent records information about the animals and the system which it came from, although cannot guarantee that the slaughtering, meat processing and distribution are error proof. Besides, there is a differential price, at least at the international market, based on sex and breed composition of the animals. Genetic markers allow identification of characteristics controlled in the beef cattle traceability program, as sex and breed composition, in order to correctly identify and appraise the final product for the consumer. The hypothesis of this study was that the majority beef samples retailed in the local market originate from female with a great participation of zebu breeds. Therefore, the objective of this work was to characterize retail beef samples with DNA markers that identify cattle sex and breed composition. Within 10 beef shops localized in Pirassununga, SP, Brazil, 61 samples were collected, all were genotyped as harboring Bos taurus mitochondrial DNA and 18 were positive for the Y chromosome amplification (male. For the marker sat1711b-Msp I the frequency of the allele A was 0.278 and for the marker Lhr-Hha I the frequency of the allele T was 0.417. The results of sat1711b-Msp I and Lhr-Hha I allelic frequencies are suggestive that the proportion of indicus genome compared with the taurine genome in the market meat is smaller than the observed in the Nellore breed. The procedure described in this study identified sex and subspecies characteristics of beef meat samples, with potential application in meat products certification in special as an auxiliary tool in beef cattle traceability programs.Várias características são importantes no sistema de rastreabilidade, como o sexo, a idade, a raça e/ou a composição racial dos animais, al

  5. Nuclear and mitochondrial markers reveal evidence for genetically segregated cryptic speciation in giant Pacific octopuses from Prince William Sound, Alaska

    Science.gov (United States)

    Toussaint, Rebecca K.; Scheel, David; Sage, G.K.; Talbot, S.L.

    2012-01-01

    Multiple species of large octopus are known from the north Pacific waters around Japan, however only one large species is known in the Gulf of Alaska (the giant Pacific octopus, Enteroctopus dofleini). Current taxonomy of E. dofleini is based on geographic and morphological characteristics, although with advances in genetic technology that is changing. Here, we used two mitochondrial genes (cytochrome b and cytochrome oxidase I), three nuclear genes (rhodopsin, octopine dehydrogenase, and paired-box 6), and 18 microsatellite loci for phylogeographic and phylogenetic analyses of octopuses collected from across southcentral and the eastern Aleutian Islands (Dutch Harbor), Alaska. Our results suggest the presence of a cryptic Enteroctopus species that is allied to, but distinguished from E. dofleini in Prince William Sound, Alaska. Existence of an undescribed and previously unrecognized taxon raises important questions about the taxonomy of octopus in southcentral Alaska waters.

  6. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  7. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  8. Distributed anonymous function computation in information fusion and multiagent systems

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2009-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we exhibit a class of non-computable functions, and prove that every function outside this class can at least be approximated. The problem of computing averages in a distributed manner plays a central role in our development.

  9. Virtues and Perils of Anonymity: Should Intermediaries Bear the Burden?

    OpenAIRE

    Zingales, Nicolo

    2014-01-01

    On October 10, 2013, the Chamber of the European Court of Human Rights (ECtHR) handed down a judgment (Delfi v. Estonia) condoning Estonia for a law which, as interpreted, held a news portal liable for the defamatory comments of its users. Amongst the considerations that led the Court to find no violation of freedom of expression in this particular case were, above all, the inadequacy of the automatic screening system adopted by the website and the users’ option to post their comments anonym...

  10. Quantum election scheme based on anonymous quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.

  11. Study of the impact of radionuclides discharges from nuclear industry in the northern Cotentin area on the oyster Crassostrea gigas: expression of cellular stress molecular markers

    International Nuclear Information System (INIS)

    This thesis explores the potential radiological impact of radionuclide discharges from the nuclear industry on the Pacific oyster, Crassostrea gigas. One of the major goals of this research was to identify markers that could be used to monitor the effects of low-level chronic irradiation. We decided to focalize on the expression of stress-induced genes involved in the regulation of cellular stress, focusing on transcription. First, homology cloning was used to identify four new cDNAs encoding stress markers. Then data collected at various sites enabled to evidence that mRNA levels for each of the genes of interest naturally vary to a significant degree, based on individual differences and seasonal factors. Comparing oysters from exposed sites with those from a reference site located on the Atlantic coast did not suggest any relationship between mRNA levels changes and the oysters exposure to liquid radioactive waste from the A.R.E.V.A. reprocessing plant. In the environment, we found that those radionuclide releases resulted in a very small increase in radioactivity in oysters, especially compared with their natural radioactivity. In the laboratory, by exposing the oysters to higher radionuclide concentrations than those found in the environment, we were able to identify two genes as potential candidates for studying the effects of chronic exposure to low doses of ionizing radiations in the oyster: genes encoding MT and MXR. We confirmed that transcriptional induction of these two genes occurs in response to high doses of acute irradiation. Finally, the comparison between environmental results and the laboratory results underlined the complementarity of these two approaches. In particular, it revealed that seasonal variations in mRNA levels probably have a significant effect on the stress response. (author)

  12. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    Science.gov (United States)

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. PMID:27073260

  13. Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace

    Directory of Open Access Journals (Sweden)

    Jianwen Sun

    2012-02-01

    Full Text Available Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable length character n-gram is used to represent the author’s writing style. The technique of IG seeded GA based feature selection for Ensemble (IGAE is also developed to build an identification model based on individual author level features. Several specific components for dealing with the individual feature set are integrated to improve the performance. The proposed feature and technique are evaluated on a real world data set encompassing reviews posted by 50 Amazon customers. The experimental results show the effectiveness of the proposed framework, with accuracy over 94% for 20 authors and over 80% for 50 ones. Compared with the baseline technique (Support Vector Machine, a higher performance is achieved by using IGAE, resulting in a 2% and 8% improvement over SVM for 20 and 50 authors respectively. Moreover, it has been shown that IGAE is more scalable in terms of the number of authors, than author group level based methods.

  14. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  15. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  16. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  17. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought. PMID:22908618

  18. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-05-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  19. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  20. Tumor Markers

    Science.gov (United States)

    ... guidelines on a variety of topics, including tumor markers for breast cancer, colorectal cancer, lung cancer, and others. The ... of recurrence 70-Gene signature (Mammaprint®) Cancer type: Breast ... Can tumor markers be used in cancer screening? Because tumor markers ...

  1. Revealing pancrustacean relationships: Phylogenetic analysis of ribosomal protein genes places Collembola (springtails in a monophyletic Hexapoda and reinforces the discrepancy between mitochondrial and nuclear DNA markers

    Directory of Open Access Journals (Sweden)

    Mariën J

    2008-03-01

    Full Text Available Abstract Background In recent years, several new hypotheses on phylogenetic relations among arthropods have been proposed on the basis of DNA sequences. One of the challenged hypotheses is the monophyly of hexapods. This discussion originated from analyses based on mitochondrial DNA datasets that, due to an unusual positioning of Collembola, suggested that the hexapod body plan evolved at least twice. Here, we re-evaluate the position of Collembola using ribosomal protein gene sequences. Results In total 48 ribosomal proteins were obtained for the collembolan Folsomia candida. These 48 sequences were aligned with sequence data on 35 other ecdysozoans. Each ribosomal protein gene was available for 25% to 86% of the taxa. However, the total sequence information was unequally distributed over the taxa and ranged between 4% and 100%. A concatenated dataset was constructed (5034 inferred amino acids in length, of which ~66% of the positions were filled. Phylogenetic tree reconstructions, using Maximum Likelihood, Maximum Parsimony, and Bayesian methods, resulted in a topology that supports monophyly of Hexapoda. Conclusion Although ribosomal proteins in general may not evolve independently, they once more appear highly valuable for phylogenetic reconstruction. Our analyses clearly suggest that Hexapoda is monophyletic. This underpins the inconsistency between nuclear and mitochondrial datasets when analyzing pancrustacean relationships. Caution is needed when applying mitochondrial markers in deep phylogeny.

  2. A New Classification of Ficus Subsection Urostigma (Moraceae Based on Four Nuclear DNA Markers (ITS, ETS, G3pdh, and ncpGS, Morphology and Leaf Anatomy.

    Directory of Open Access Journals (Sweden)

    Bhanumas Chantarasuwan

    Full Text Available Ficus subsection Urostigma as currently circumscribed contains 27 species, distributed in Africa, Asia, Australia and the Pacific, and is of key importance to understand the origin and evolution of Ficus and the fig-wasp mutualism. The species of subsection Urostigma are very variable in morphological characters and exhibit a wide range of often partly overlapping distributions, which makes identification often difficult. The systematic classification within and between this subsection and others is problematic, e.g., it is still unclear where to classify F. amplissima and F. rumphii. To clarify the circumscription of subsection Urostigma, a phylogenetic reconstruction based on four nuclear DNA markers (ITS, ETS, G3pdh, and ncpGS combined with morphology and leaf anatomy is conducted. The phylogenetic tree based on the combined datasets shows that F. madagascariensis, a Madagascan species, is sister to the remainder of subsect. Urostigma. Ficus amplissima and F. rumphii, formerly constituting sect. Leucogyne, appear to be imbedded in subsect. Conosycea. The result of the phylogenetic analysis necessitates nomenclatural adjustments. A new classification of Ficus subsection Urostigma is presented along with the morphological and leaf anatomical apomorphies typical for the clades. Two new species are described ─ one in subsect. Urostigma, the other in Conosycea. One variety is raised to species level.

  3. A New Classification of Ficus Subsection Urostigma (Moraceae) Based on Four Nuclear DNA Markers (ITS, ETS, G3pdh, and ncpGS), Morphology and Leaf Anatomy.

    Science.gov (United States)

    Chantarasuwan, Bhanumas; Berg, Cornelis C; Kjellberg, Finn; Rønsted, Nina; Garcia, Marjorie; Baider, Claudia; van Welzen, Peter C

    2015-01-01

    Ficus subsection Urostigma as currently circumscribed contains 27 species, distributed in Africa, Asia, Australia and the Pacific, and is of key importance to understand the origin and evolution of Ficus and the fig-wasp mutualism. The species of subsection Urostigma are very variable in morphological characters and exhibit a wide range of often partly overlapping distributions, which makes identification often difficult. The systematic classification within and between this subsection and others is problematic, e.g., it is still unclear where to classify F. amplissima and F. rumphii. To clarify the circumscription of subsection Urostigma, a phylogenetic reconstruction based on four nuclear DNA markers (ITS, ETS, G3pdh, and ncpGS) combined with morphology and leaf anatomy is conducted. The phylogenetic tree based on the combined datasets shows that F. madagascariensis, a Madagascan species, is sister to the remainder of subsect. Urostigma. Ficus amplissima and F. rumphii, formerly constituting sect. Leucogyne, appear to be imbedded in subsect. Conosycea. The result of the phylogenetic analysis necessitates nomenclatural adjustments. A new classification of Ficus subsection Urostigma is presented along with the morphological and leaf anatomical apomorphies typical for the clades. Two new species are described ─ one in subsect. Urostigma, the other in Conosycea. One variety is raised to species level.

  4. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  5. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  6. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  7. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  8. Nuclear

    International Nuclear Information System (INIS)

    This document proposes a presentation and discussion of the main notions, issues, principles, or characteristics related to nuclear energy: radioactivity (presence in the environment, explanation, measurement, periods and activities, low doses, applications), fuel cycle (front end, mining and ore concentration, refining and conversion, fuel fabrication, in the reactor, back end with reprocessing and recycling, transport), the future of the thorium-based fuel cycle (motivations, benefits and drawbacks), nuclear reactors (principles of fission reactors, reactor types, PWR reactors, BWR, heavy-water reactor, high temperature reactor of HTR, future reactors), nuclear wastes (classification, packaging and storage, legal aspects, vitrification, choice of a deep storage option, quantities and costs, foreign practices), radioactive releases of nuclear installations (main released radio-elements, radioactive releases by nuclear reactors and by La Hague plant, gaseous and liquid effluents, impact of releases, regulation), the OSPAR Convention, management and safety of nuclear activities (from control to quality insurance, to quality management and to sustainable development), national safety bodies (mission, means, organisation and activities of ASN, IRSN, HCTISN), international bodies, nuclear and medicine (applications of radioactivity, medical imagery, radiotherapy, doses in nuclear medicine, implementation, the accident in Epinal), nuclear and R and D (past R and D programmes and expenses, main actors in France and present funding, main R and D axis, international cooperation)

  9. Highly Informative Single-Copy Nuclear Microsatellite DNA Markers Developed Using an AFLP-SSR Approach in Black Spruce (Picea mariana) and Red Spruce (P. rubens)

    OpenAIRE

    Yong-Zhong Shi; Natascha Forneris; Rajora, Om P

    2014-01-01

    Background Microsatellites or simple sequence repeats (SSRs) are highly informative molecular markers for various biological studies in plants. In spruce (Picea) and other conifers, the development of single-copy polymorphic genomic microsatellite markers is quite difficult, owing primarily to the large genome size and predominance of repetitive DNA sequences throughout the genome. We have developed highly informative single-locus genomic microsatellite markers in black spruce (Picea mariana)...

  10. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  11. Toward Analysis of the Relations Among the Youth Counterculture, Telephone Hotlines, and Anonymity

    Science.gov (United States)

    Baizerman, Michael

    1974-01-01

    During the 1960's, there emerged innovative human service programs for youth. Among the actual differences in these programs compared to their older, established human service agencies was (is) the prominent position of the social value of client anonymity. This anonymity is examined in an attempt to understand its role. (RC)

  12. Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs

    CERN Document Server

    Das, Sudipto; Abbadi, Amr El

    2010-01-01

    The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Anonymization of these social graphs is important to facilitate publishing these data sets for analysis by external entities. Prior work has concentrated mostly on node identity anonymization and structural anonymization. But with the growing interest in analyzing social networks as a weighted network, edge weight anonymization is also gaining importance. We present An\\'onimos, a Linear Programming based technique for anonymization of edge weights that preserves linear properties of graphs. Such properties form the foundation of many important graph-theoretic algorithms such as shortest paths problem, k-nearest neighbors, minimum cost spanning tree, and maximizing information spread. As a proof of concept, we apply An\\'onimos to the shortest paths problem and its extensions, prove the correctness, analyze complexity, and experimentally evaluate it using real social network data sets. O...

  13. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection. PMID:23366349

  14. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  15. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  16. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  17. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  18. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure. PMID:26267063

  19. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  20. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...... remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet...

  1. Discrimination of uranium chemo-toxic and radio-toxic effects: definition of biological markers for evaluating professional risks in nuclear industry

    International Nuclear Information System (INIS)

    Uranium (U) is a heavy metal that is also considered as an alpha emitter. Thus the origin of U toxicity is both chemical and radiological. The identification of bio-markers to discriminate chemical and radiological toxicity for a given U compound is required to assess accurately the health effects of isotopic mixtures such as depleted U in 235U with a low specific activity. Data from the literature show that the best candidates are cytogenetic markers. In the present work, the assessment of bio-markers of U contamination was performed on three cellular models (mouse fibroblasts, rat lymphocytes and human lymphocytes) that were exposed to different isotopic mixtures of U. The cytokinesis-block micronucleus (MN) centromere assay was performed to discriminate the chemo-toxic and radio-toxic effects of U. This study showed that the evaluation of micronuclei in bi-nucleated cells could not assess U genotoxicity accurately. Instead, the assessment of centromere-negative micronuclei and nucleo-plasmic bridges correlated with the radio-toxic effects of U. The evaluation of centromere-positive micronuclei and micronuclei in mono-nucleated cells correlated with the chemo-toxic effects of U. These cytogenetic markers should be validated on different biological models and could be proposed to discriminate radiological and chemical toxicity of a given isotopic mixture of U. These four cytogenetic markers could be a useful complement of the classical dosimetric bio-markers for the assessment of internal uranium contamination. (author)

  2. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    Science.gov (United States)

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  3. Atomic and anonymous e-Cash transaction protocol with off-line TTP

    Institute of Scientific and Technical Information of China (English)

    王茜; 李朝阳; 杨德礼

    2004-01-01

    Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants' interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest partici-pants, but also features high efficiency and practicability. The new protocol also avoids transaction from a am-biguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction proto-col.

  4. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  5. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  6. [Quality of anonymous delivery procedures: analysis of practices and ethical issues.

    OpenAIRE

    Fassy-Colcombet, Marion; Tsatsaris, Vassilis; Moutel, Grégoire; Cabrol, Dominique; Hervé, Christian

    2006-01-01

    OBJECTIVES: The purpose of this study was to assess implementation of procedures for anonymous delivery and also to determine the awareness of the medical team. MATERIAL: and method. We reviewed retrospectively all deliveries performed in a Paris maternity ward during the years 2000-2003 where the mother requested application of the anonymous procedure. A questionnaire was also addressed to all physicians and midwives in the same institution in order to evaluate their knowledge of the procedu...

  7. Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    OpenAIRE

    J.Praveen Kumar; B Shyam Kumar

    2013-01-01

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, hasbeen limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing ne...

  8. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  9. The Impact of anonymity in elicitation of brand associations : theoretical and empirical developments

    OpenAIRE

    Supphellen, Magne

    1998-01-01

    Effective brand management requires a thorough understanding of the consumer. In particular, managers need to know which associations consumers have for their brands. In this study, we address the role of anonymity in interviews designed to elicit brand associations from consumers' memories. First, the concept of anonymity is examined in order to arrive at a useful definition. Based on a review ofpotential psychological motives for response distortion and a review of the nature...

  10. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community

    OpenAIRE

    Bernstein, Michael; Monroy-Hernández, Andrés; Harry, Drew; André, Paul; Panovich, Katrina; Vargas, Greg

    2011-01-01

    We present two studies of online ephemerality and anonymity based on the popular discussion board /b/ at 4chan.org: a website with over 7 million users that plays an influential role in Internet culture. Although researchers and practitioners often assume that user identity and data permanence are central tools in the design of online communities, we explore how /b/ succeeds despite being almost entirely anonymous and extremely ephemeral. We begin by describing /b/ and performing a content an...

  11. A secure and effective anonymous authentication scheme for roaming service in global mobility networks

    OpenAIRE

    Dawei ZHAO; Peng, Haipeng; Li, Lixiang; Yang, Yixian

    2013-01-01

    Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.'s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user friendliness, user's anonymity, proper mutual authentication and local verification. To remedy these weaknesses, in this paper we propose a ...

  12. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  13. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  14. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  15. Decision No. 2008-DC-0114 of 26 September 2008 by the French Nuclear Safety Authority Setting Forth Specific Requirements to Be Met by Electricite de France - Societe anonyme (EDF-SA) at the Flamanville Nuclear site Regarding the Design and Construction of the Flamanville-3 (INB No. 167) NPP and the Operation of Flamanville-1 (INB No. 108) and Flamanville-2 (INB No. 109) NPPs

    International Nuclear Information System (INIS)

    This decision sets forth the requirements to be met by Electricite de France (EDF-SA), the operator, regarding the design and construction of Basic Nuclear Installation ('installation nucleaire de base' - INB) No. 167 and the operation of INBs Nos. 108 and 109 on the Flamanville Site, Manche Department. The specific requirements applicable to INB No. 167 (Flamanville-3) are described in Annex 1. Common requirements applicable to INBs Nos. 167 (Flamanville 3), 108 (Flamanville 1) and 109 (Flamanville 2) are described in Annex 2. Content of the annex 1 (Requirements applicable to INB No. 167 - Flamanville-3): Organisation and management: Organisation and management, Operations to be declared to or approved by ASN; Accident-risk management: Process control (Nuclear safety demonstration, Compliance of operations, Analysis of internal and external hazards leading to hostile conditions or damages to structures, systems and components, Analysis of hazards caused by the environment of the installation that may induced hostile conditions or damages to structures, systems and components, Probabilistic studies, Specific studies, Environmental qualification of systems, equipment, material and components, Controls or tests performed to comply with the hypotheses used in safety demonstration); Prevention of accident conditions that may lead to large early releases (Core-meltdown situations occurring while the primary circuit is at high pressure, Fuel-meltdown situations in the spent-fuel cooling pool, Reactivity accidents resulting from the rapid introduction in the primary circuit of cold water or of water with an insufficient concentration of soluble neutron absorber, Core-meltdown situations with containment bypass, Global hydrogen detonations and steam explosions likely to compromise the integrity of the reactor containment), Basic nuclear safety functions of the installation (Common provisions, Reactivity control, Cooling of nuclear fuel, Containment of radioactive

  16. Bone Markers

    Science.gov (United States)

    ... bone turnover: C-telopeptide (C-terminal telopeptide of type 1 collagen (CTx)) – a marker for bone resorption. It is ... resorption include: N-telopeptide (N-terminal telopeptide of type 1 collagen (NTx)) – a peptide fragment from the amino terminal ...

  17. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  18. Highly informative single-copy nuclear microsatellite DNA markers developed using an AFLP-SSR approach in black spruce (Picea mariana and red spruce (P. rubens.

    Directory of Open Access Journals (Sweden)

    Yong-Zhong Shi

    Full Text Available Microsatellites or simple sequence repeats (SSRs are highly informative molecular markers for various biological studies in plants. In spruce (Picea and other conifers, the development of single-copy polymorphic genomic microsatellite markers is quite difficult, owing primarily to the large genome size and predominance of repetitive DNA sequences throughout the genome. We have developed highly informative single-locus genomic microsatellite markers in black spruce (Picea mariana and red spruce (Picea rubens using a simple but efficient method based on a combination of AFLP and microsatellite technologies.A microsatellite-enriched library was constructed from genomic AFLP DNA fragments of black spruce. Sequencing of the 108 putative SSR-containing clones provided 94 unique sequences with microsatellites. Twenty-two of the designed 34 primer pairs yielded scorable amplicons, with single-locus patterns. Fourteen of these microsatellite markers were characterized in 30 black spruce and 30 red spruce individuals drawn from many populations. The number of alleles at a polymorphic locus ranged from 2 to 18, with a mean of 9.3 in black spruce, and from 3 to 15, with a mean of 6.2 alleles in red spruce. The polymorphic information content or expected heterozygosity ranged from 0.340 to 0.909 (mean = 0.67 in black spruce and from 0.161 to 0.851 (mean = 0.62 in red spruce. Ten SSR markers showing inter-parental polymorphism inherited in a single-locus Mendelian mode, with two cases of distorted segregation. Primer pairs for almost all polymorphic SSR loci resolved microsatellites of comparable size in Picea glauca, P. engelmannii, P. sitchensis, and P. abies.The AFLP-based microsatellite-enriched library appears to be a rapid, cost-effective approach for isolating and developing single-locus informative genomic microsatellite markers in black spruce. The markers developed should be useful in black spruce, red spruce and other Picea species for

  19. Risk factors for father-daughter incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; Kuo, Shih-Ya; O'Keefe, Stephen L; Beard, Keith W; Swindell, Sam; Kommor, Martin J

    2013-12-01

    Retrospective data from 2,034 female participants, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for father-daughter incest (FDI). A total of 51 participants had reported having experienced FDI. The risk factors identified within the nuclear family by the multiple logistic regression analysis included the following: (a) Having parents whose relationship included verbal or physical fighting or brutality increased the likelihood of FDI by approximately 5 times; (b) families accepting father-daughter nudity as measured by a scale with values ranging from 0 to 4 increased the likelihood of FDI by approximately 2 times for each unit value increase of 1 above 0; (c) demonstrating maternal affection protected against FDI. The likelihood of being a victim of FDI was highest if the participant's mother never kissed or hugged her; it decreased by 0.44 for a 1-unit increase in affection and by 0.19 times for a 2-unit increase; and (d) being in homes headed by single-parent mothers or where divorce or death of the father had resulted in a man other than the biological father living in the home increased the risk of FDI by approximately 3.2 times. The results were consistent with the idea that FDI in many families was the cumulative result of a circular pattern of interactions, a finding that has implications for treatment of the perpetrator, the victim, and the families. The data also suggested it may be possible to design an information program for parents that will result in reducing the risk of FDI in families implementing the program's recommendations.

  20. Etiological Risk Factors for Sibling Incest: Data From an Anonymous Computer-Assisted Self-Interview.

    Science.gov (United States)

    Griffee, Karen; Swindell, Sam; O'Keefe, Stephen L; Stroebel, Sandra S; Beard, Keith W; Kuo, Shih-Ya; Stroupe, Walter

    2016-10-01

    Retrospective data from 1,821 women and 1,064 men with one or more siblings, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for sibling incest (SI); 137 were participants in SI. In order of decreasing predictive power, the risk factors identified by the multiple logistic regression analysis included ever having shared a bed for sleeping with a sibling, parent-child incest (PCI), family nudity, low levels of maternal affection, and ever having shared a tub bath with a sibling. The results were consistent with the idea that SI in many families was the cumulative result of four types of parental behaviors: (a) factors that lower external barriers to sexual behavior (e.g., permitting co-sleeping or co-bathing of sibling dyads), (b) factors that encourage nudity of children within the nuclear family and permit children to see the parent's genitals, (c) factors that lead to the siblings relying on one another for affection (e.g., diminished maternal affection), and (d) factors that eroticize young children (e.g., child sexual abuse [CSA] by a parent). Thirty-eight of the 137 SI participants were participants in coerced sibling incest (CSI). In order of decreasing predictive power, risk factors for CSI identified by multiple logistic regression analysis included ever having shared a bed for sleeping with a brother, PCI, witnessing parental physical fighting, and family nudity. SI was more likely to have been reported as CSI if the sibling had touched the reporting sibling's genitals, and less likely to have been reported as CSI if the siblings had shared a bed.

  1. Etiological Risk Factors for Sibling Incest: Data From an Anonymous Computer-Assisted Self-Interview.

    Science.gov (United States)

    Griffee, Karen; Swindell, Sam; O'Keefe, Stephen L; Stroebel, Sandra S; Beard, Keith W; Kuo, Shih-Ya; Stroupe, Walter

    2016-10-01

    Retrospective data from 1,821 women and 1,064 men with one or more siblings, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for sibling incest (SI); 137 were participants in SI. In order of decreasing predictive power, the risk factors identified by the multiple logistic regression analysis included ever having shared a bed for sleeping with a sibling, parent-child incest (PCI), family nudity, low levels of maternal affection, and ever having shared a tub bath with a sibling. The results were consistent with the idea that SI in many families was the cumulative result of four types of parental behaviors: (a) factors that lower external barriers to sexual behavior (e.g., permitting co-sleeping or co-bathing of sibling dyads), (b) factors that encourage nudity of children within the nuclear family and permit children to see the parent's genitals, (c) factors that lead to the siblings relying on one another for affection (e.g., diminished maternal affection), and (d) factors that eroticize young children (e.g., child sexual abuse [CSA] by a parent). Thirty-eight of the 137 SI participants were participants in coerced sibling incest (CSI). In order of decreasing predictive power, risk factors for CSI identified by multiple logistic regression analysis included ever having shared a bed for sleeping with a brother, PCI, witnessing parental physical fighting, and family nudity. SI was more likely to have been reported as CSI if the sibling had touched the reporting sibling's genitals, and less likely to have been reported as CSI if the siblings had shared a bed. PMID:25432976

  2. Risk factors for father-daughter incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; Kuo, Shih-Ya; O'Keefe, Stephen L; Beard, Keith W; Swindell, Sam; Kommor, Martin J

    2013-12-01

    Retrospective data from 2,034 female participants, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for father-daughter incest (FDI). A total of 51 participants had reported having experienced FDI. The risk factors identified within the nuclear family by the multiple logistic regression analysis included the following: (a) Having parents whose relationship included verbal or physical fighting or brutality increased the likelihood of FDI by approximately 5 times; (b) families accepting father-daughter nudity as measured by a scale with values ranging from 0 to 4 increased the likelihood of FDI by approximately 2 times for each unit value increase of 1 above 0; (c) demonstrating maternal affection protected against FDI. The likelihood of being a victim of FDI was highest if the participant's mother never kissed or hugged her; it decreased by 0.44 for a 1-unit increase in affection and by 0.19 times for a 2-unit increase; and (d) being in homes headed by single-parent mothers or where divorce or death of the father had resulted in a man other than the biological father living in the home increased the risk of FDI by approximately 3.2 times. The results were consistent with the idea that FDI in many families was the cumulative result of a circular pattern of interactions, a finding that has implications for treatment of the perpetrator, the victim, and the families. The data also suggested it may be possible to design an information program for parents that will result in reducing the risk of FDI in families implementing the program's recommendations. PMID:23363491

  3. Single nucleotide polymorphisms and indel markers from the transcriptome of garlic

    Science.gov (United States)

    Garlic (Allium sativum L.) is cultivated world-wide and widely appreciated for its culinary uses. In spite of primarily being asexually propagated, garlic shows great diversity for adaptation to diverse production environments and bulb phenotypes. Anonymous molecular markers have been used to assess...

  4. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  5. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  6. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  7. Impact of Anonymity on Information Sharing through Internal Psychological Processes: A Case of South Korean Online Communities

    OpenAIRE

    Ho Lee; Jaewon Choi; Kyung Kyu Kim; Ae Ri Lee

    2014-01-01

    Many web users post their opinions and information without revealing their identities (i.e., demographics, social standing, and/or expertise); anonymity has become a common form of information exchange in online communities such as social media sites and Internet forums. In the meantime, negative social consequences have resulted from anonymous activities in online communities. Existing literature reports largely mixed results about the impact of online anonymity on online community outcomes....

  8. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  9. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  10. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions. PMID:26785867

  11. Hybridization and massive mtDNA unidirectional introgression between the closely related Neotropical toads Rhinella marina and R. schneideri inferred from mtDNA and nuclear markers

    Directory of Open Access Journals (Sweden)

    Schneider Horacio

    2011-09-01

    Full Text Available Abstract Background The classical perspective that interspecific hybridization in animals is rare has been changing due to a growing list of empirical examples showing the occurrence of gene flow between closely related species. Using sequence data from cyt b mitochondrial gene and three intron nuclear genes (RPL9, c-myc, and RPL3 we investigated patterns of nucleotide polymorphism and divergence between two closely related toad species R. marina and R. schneideri. By comparing levels of differentiation at nuclear and mtDNA levels we were able to describe patterns of introgression and infer the history of hybridization between these species. Results All nuclear loci are essentially concordant in revealing two well differentiated groups of haplotypes, corresponding to the morphologically-defined species R. marina and R. schneideri. Mitochondrial DNA analysis also revealed two well-differentiated groups of haplotypes but, in stark contrast with the nuclear genealogies, all R. schneideri sequences are clustered with sequences of R. marina from the right Amazon bank (RAB, while R. marina sequences from the left Amazon bank (LAB are monophyletic. An Isolation-with-Migration (IM analysis using nuclear data showed that R. marina and R. schneideri diverged at ≈ 1.69 Myr (early Pleistocene, while R. marina populations from LAB and RAB diverged at ≈ 0.33 Myr (middle Pleistocene. This time of divergence is not consistent with the split between LAB and RAB populations obtained with mtDNA data (≈ 1.59 Myr, which is notably similar to the estimate obtained with nuclear genes between R. marina and R. schneideri. Coalescent simulations of mtDNA phylogeny under the speciation history inferred from nuclear genes rejected the hypothesis of incomplete lineage sorting to explain the conflicting signal between mtDNA and nuclear-based phylogenies. Conclusions The cytonuclear discordance seems to reflect the occurrence of interspecific hybridization between these

  12. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  13. 电子投票匿名性分析%Anonymity Analysis of Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    黄福人; 屈玉贵

    2011-01-01

    电子投票公布计票结果会影响投票者的匿名性.针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化.分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失.%The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting. Aiming at this problem, this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy. It compares the anonymity after the release of the voting results with that before releasing the voting results. Analysis result shows that the smaller the voting scale is, the more the voters' anonymity loses. In the design of small-scale electronic-voting scheme, releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.

  14. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  15. The French bioethics public consultation and the anonymity doctrine: empirical ethics and normative assumptions.

    Science.gov (United States)

    Spranzi, Marta; Brunet, Laurence

    2015-03-01

    The French bioethics laws of 1994 contain the principles of the anonymity and non commodification of all donations of body parts and products including gametes in medically assisted reproduction. The two revisions of the law, in 2004 and 2011 have upheld the rule. In view of the latest revision process, the French government organized a large public consultation in 2009 ("Etats généraux de la bioéthique"). Within the event a "consensus conference" was held in Rennes about different aspects of assisted reproduction (access, anonymity, gratuity and surrogacy). In what follows we shall first describe the anonymity clause for gamete donations in the French law and the debates surrounding it. We shall then analyse the procedure used for the 2009 public consultation and the related consensus conference, as well as its upshot concerning the anonymity doctrine. In this respect we shall compare the citizens' own recommendations on the gamete anonymity issue and its translation in the consultation's final report drafted by a philosopher mandated by the organizing committee. Whereas the final report cited some fundamental ethical arguments as reason for upholding the provisions of the law-most notably the refusal of the 'all biological' approach to reproductive issues-citizens were more careful and tentative in their position although they also concluded that for pragmatic reasons the anonymity rule should continue to hold. We shall argue that the conservative upshot of the public consultation is due to some main underlying presuppositions concerning the citizens' role and expertise as well as to the specific design of the consensus conference. Our conclusion will be that public consultations and consensus conferences can only serve as an empirical support for devising suitable bioethics norms by using second-order normative assumptions. PMID:25783454

  16. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  17. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  18. Determination of the Internet Anonymity Influence on the Level of Aggression and Usage of Obscene Lexis

    OpenAIRE

    Potapova, Rodmonga; Gordeev, Denis

    2015-01-01

    This article deals with the analysis of the semantic content of the anonymous Russian-speaking forum 2ch.hk, different verbal means of expressing of the emotional state of aggression are revealed for this site, and aggression is classified by its directions. The lexis of different Russian-and English- speaking anonymous forums (2ch.hk and iichan.hk, 4chan.org) and public community "MDK" of the Russian-speaking social network VK is analyzed and compared with the Open Corpus of the Russian lang...

  19. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    Science.gov (United States)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  20. Genetic analysis of six communities of Mbyá-Guaraní inhabiting northeastern Argentina by means of nuclear and mitochondrial polymorphic markers.

    Science.gov (United States)

    Sala, Andrea; Argüelles, Carina F; Marino, Miguel E; Bobillo, Cecilia; Fenocchio, Alberto; Corach, Daniel

    2010-08-01

    Autosomal STRs, Y-chromosome markers, and mitochondrial DNA sequences were investigated in six Mbyá-Guaraní villages (Fortín M'Bororé, Yryapu, Tabay, Kaaguy Poty, Jejy, and Yaboti), all of them settled within the province of Misiones, northeastern Argentina. One hundred twenty-one unrelated individuals were analyzed. The study involved typing fifteen autosomal STRs, nine Y-chromosome STRs, and four biallele loci in the nonrecombinant region of the Y chromosome, sequencing the mtDNA of hypervariable regions I and II, and detecting the 9-bp ins/del in region V of mtDNA. All autosomal STRs were in Hardy-Weinberg equilibrium. The four major native American mtDNA haplogroups were represented in the sample. Haplogroups A2 and D1 exhibited the highest frequencies (40.5% and 36.0%, respectively), and haplogroups B2 and C1 appeared to be less frequent (17.5% and 6.0%, respectively). The native American haplogroup Q1a3a was observed in a relevant proportion (88.8%). In addition, a nine-STR Y-chromosome haplo-type (DYS19*13, DYS389I*14, DYS389II*31, DYS390*24, DYS391*11, DYS392*14, DYS393*11, DYS385A*14, DYS385B*16) exhibited a frequency of more than 36%. Our results indicate that the analyzed Argentinean Guaraní individuals are genetically more closely related to Guaraní from Brazil [genetic distance (Δµ)(2) = 0.48] than to other related tribes that are geographically closer. Statistical approaches based on autosomal data do not support the hypothesis of genetic drift previously proposed; however, this apparent discrepancy might be due to the lack of sensitivity of the autosomal markers used here. PMID:21082911

  1. The Effect of Computer-Mediated Communication on Anonymous End-of-Course Teaching Evaluations

    Science.gov (United States)

    Rhea, Nancy; Rovai, Alfred; Ponton, Michael; Derrick, Gail; Davis, John

    2007-01-01

    The purpose of this study was to determine if the nature of student comments on anonymous end-of-course evaluations differed relative to course delivery medium. Comments evaluated were submitted by 202 graduate students enrolled in face-to-face (F2F) and online versions of research and statistics courses over a four-year period. Results suggested…

  2. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    Directory of Open Access Journals (Sweden)

    Thorben Burghardt

    2011-04-01

    Full Text Available Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper studies this tradeoff systematically. To this end, we implement an algorithm for the anonymization of search histories which is flexible regarding the target function. It can retain frequent terms or terms where corresponding ads are clicked with a high probability, keep up the number of users it can derive interests for, etc. We quantify the usefulness of the anonymized log for ad placement in a broad way, e.g., by estimating the number of ad clicks or of ad impressions, based on marketing data from Yahoo! As a result, anonymized search logs are still useful for ad placement, but this very much depends on the target function.

  3. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  4. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  5. Improvement of the security of quantum protocols for anonymous voting and surveying

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Several quantum protocols were proposed in a recent paper by Vaccaro,Spring and Chefles for ensuring the anonymous voting in a number of different scenarios.However,it is shown that their protocols are very vulnerable in terms of security.Improved schemes are also presented to recover the security.

  6. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  7. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  8. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  9. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  10. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  11. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  12. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  13. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  14. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    they reach their majority, to obtain some information pertaining to the health or the identity of their genetic parents. This presents ethical problems. It can be argued that the anonymity of the parents chiefly affects the children, so that an agreement on this point among parents, doctors and others must...

  15. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  16. Evolutionary approach to violating group anonymity using third-party data.

    Science.gov (United States)

    Tavrov, Dan; Chertov, Oleg

    2016-01-01

    In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. PMID:26844025

  17. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  18. Leadership Style, Anonymity, and Creativity in Group Decision Support Systems: The Mediating Role of Optimal Flow.

    Science.gov (United States)

    Sosik, John J.; Kahai, Surinder S.; Avolio, Bruce J.

    1999-01-01

    A study involving 159 undergraduates found that flow (a psychological state characterized by concentration, enjoyment, and intrinsic motivation) mediated effects of leadership style on creativity in a Group Decision Support System (GDSS) context, and that its role may be moderated by anonymity. Results also indicated that both flow and anonymity…

  19. Anonymity in giving in a natural context - a field experiment in 30 churches

    NARCIS (Netherlands)

    Soetevent, AR

    2005-01-01

    The role of anonymity in giving is examined in a field experiment performed in 30 Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either 'closed' collection bags or open collection baskets. When usi

  20. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    NARCIS (Netherlands)

    Soetevent, Adriaan R.

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When

  1. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  2. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  3. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  4. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  5. Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s 'A Free and Anonymous Monument'

    Directory of Open Access Journals (Sweden)

    Giuliana Bruno

    2015-02-01

    Full Text Available Translation of the text originally published in Bruno, Giuliana. 2007. “Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s A Free and Anonymous Monument.” In Public Intimacy: Architecture and the Visual Arts, 43-86. Cambridge: MIT Press.

  6. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  7. Cybridization in Nicotiana tabacum L. using double inactivation of parental protoplasts and post-fusion selection based on nuclear-encoded and chloroplast-encoded marker genes.

    Science.gov (United States)

    Matibiri, E A; Mantell, S H

    1994-09-01

    An effective selection system preceded by double inactivation of parental protoplasts was used to transfer Nicotiana suaveolens Leh. cytoplasmic male sterility into a commercial tobacco (N. tabacum L.) breeding line. Mesophyll protoplasts from transformed plants of N. tabacum cultivar WZ2-3-1-1 possessing a neomycin phosphotransferase II gene were used as the nuclear donors, while those isolated from N. suaveolens plants carrying a chloroplast mutation for resistance to spectinomycin, induced using nitrosomethyl urea, were the cytoplasm donors in somatic cybridizations. Prior to fusion, nuclear donor protoplasts were inactivated with iodoacetamide or rhodamine 6G, while those of the cytoplasm donor were inactivated by X-irradiation. The resultant microcalli were cultured on a shoot regeneration medium containing both kanamycin and spectinomycin to select cybrids. Only regenerants that had typical characteristics of the N. tabacum cultivar were selected for transfer to the glasshouse. Four putative cytoplasmic male-sterile (CMS) plants, out of a total of 44 regenerated plants transferred to the glasshouse, were obtained. Intraspecific somatic transfers of the CMS trait between N. tabacum cultivars with distinctlydifferent morphologies using single inactivation and nonselective shoot regeneration medium were demonstrated. The implications of the results for practical tobacco breeding as a means of circumventing lengthy backcrossing procedures are discussed. PMID:24186256

  8. Simultaneous cytoplasmic and nuclear protein expression of melanoma antigen-A family and NY-ESO-1 cancer-testis antigens represents an independent marker for poor survival in head and neck cancer.

    Science.gov (United States)

    Laban, Simon; Atanackovic, Djordje; Luetkens, Tim; Knecht, Rainald; Busch, Chia-Jung; Freytag, Marcus; Spagnoli, Giulio; Ritter, Gerd; Hoffmann, Thomas K; Knuth, Alexander; Sauter, Guido; Wilczak, Waldemar; Blessmann, Marco; Borgmann, Kerstin; Muenscher, Adrian; Clauditz, Till S

    2014-09-01

    The prognosis of head and neck squamous cell carcinoma (HNSCC) patients remains poor. The identification of high-risk subgroups is needed for the development of custom-tailored therapies. The expression of cancer-testis antigens (CTAs) has been linked to a worse prognosis in other cancer types; however, their prognostic value in HNSCC is unclear because only few patients have been examined and data on CTA protein expression are sparse. A tissue microarray consisting of tumor samples from 453 HNSCC patients was evaluated for the expression of CTA proteins using immunohistochemistry. Frequency of expression and the subcellular expression pattern (nuclear, cytoplasmic, or both) was recorded. Protein expression of melanoma antigen (MAGE)-A family CTA, MAGE-C family CTA and NY-ESO-1 was found in approximately 30, 7 and 4% of tumors, respectively. The subcellular expression pattern in particular had a marked impact on the patients' prognosis. Median overall survival (OS) of patients with (i) simultaneous cytoplasmic and nuclear expression compared to (ii) either cytoplasmic or nuclear expression and (iii) negative patients was 23.0 versus 109.0 versus 102.5 months, for pan-MAGE (p ESO-1 (p = 0.0019). By multivariate analysis, these factors were confirmed as independent markers for poor survival. HNSCC patients showing protein expression of MAGE-A family members or NY-ESO-1 represent a subgroup with an extraordinarily poor survival. The development of immunotherapeutic strategies targeting these CTA may, therefore, be a promising approach to improve the outcome of HNSCC patients.

  9. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  10. Potential role of nuclear PD-L1 expression in cell-surface vimentin positive circulating tumor cells as a prognostic marker in cancer patients.

    Science.gov (United States)

    Satelli, Arun; Batth, Izhar Singh; Brownlee, Zachary; Rojas, Christina; Meng, Qing H; Kopetz, Scott; Li, Shulin

    2016-01-01

    Although circulating tumor cells (CTCs) have potential as diagnostic biomarkers for cancer, determining their prognostic role in cancer patients undergoing treatment is a challenge. We evaluated the prognostic value of programmed death-ligand 1 (PD-L1) expression in CTCs in colorectal and prostate cancer patients undergoing treatment. Peripheral blood samples were collected from 62 metastatic colorectal cancer patients and 30 metastatic prostate cancer patients. CTCs were isolated from the samples using magnetic separation with the cell-surface vimentin(CSV)-specific 84-1 monoclonal antibody that detects epithelial-mesenchymal transitioned (EMT) CTCs. CTCs were enumerated and analyzed for PD-L1 expression using confocal microscopy. PD-L1 expression was detectable in CTCs and was localized in the membrane and/or cytoplasm and nucleus. CTC detection alone was not associated with poor progression-free or overall survival in colorectal cancer or prostate cancer patients, but nuclear PD-L1 (nPD-L1) expression in these patients was significantly associated with short survival durations. These results demonstrated that nPD-L1 has potential as a clinically relevant prognostic biomarker for colorectal and prostate cancer. Our data thus suggested that use of CTC-based models of cancer for risk assessment can improve the standard cancer staging criteria and supported the incorporation of nPD-L1 expression detection in CTCs detection in such models. PMID:27363678

  11. Potential role of nuclear PD-L1 expression in cell-surface vimentin positive circulating tumor cells as a prognostic marker in cancer patients

    Science.gov (United States)

    Satelli, Arun; Batth, Izhar Singh; Brownlee, Zachary; Rojas, Christina; Meng, Qing H.; Kopetz, Scott; Li, Shulin

    2016-01-01

    Although circulating tumor cells (CTCs) have potential as diagnostic biomarkers for cancer, determining their prognostic role in cancer patients undergoing treatment is a challenge. We evaluated the prognostic value of programmed death-ligand 1 (PD-L1) expression in CTCs in colorectal and prostate cancer patients undergoing treatment. Peripheral blood samples were collected from 62 metastatic colorectal cancer patients and 30 metastatic prostate cancer patients. CTCs were isolated from the samples using magnetic separation with the cell-surface vimentin(CSV)-specific 84-1 monoclonal antibody that detects epithelial-mesenchymal transitioned (EMT) CTCs. CTCs were enumerated and analyzed for PD-L1 expression using confocal microscopy. PD-L1 expression was detectable in CTCs and was localized in the membrane and/or cytoplasm and nucleus. CTC detection alone was not associated with poor progression-free or overall survival in colorectal cancer or prostate cancer patients, but nuclear PD-L1 (nPD-L1) expression in these patients was significantly associated with short survival durations. These results demonstrated that nPD-L1 has potential as a clinically relevant prognostic biomarker for colorectal and prostate cancer. Our data thus suggested that use of CTC-based models of cancer for risk assessment can improve the standard cancer staging criteria and supported the incorporation of nPD-L1 expression detection in CTCs detection in such models. PMID:27363678

  12. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs. PMID:25352490

  13. Using t-closeness anonymity to control for non-discrimination

    Directory of Open Access Journals (Sweden)

    Salvatore Ruggieri

    2014-08-01

    Full Text Available We investigate the relation between t-closeness, a well-known model of data anonymization against attribute disclosure, and a-protection, a model of the social discrimination hidden in data. We show that t-closeness implies bd f (t-protection, for a bound function bd f ( depending on the discrimination measure f( at hand. This allows us to adapt inference control methods, such as the Mondrian multidimensional generalization technique and the Sabre bucketization and redistribution framework, to the purpose of non-discrimination data protection. The parallel between the two analytical models raises intriguing issues on the interplay between data anonymization and non-discrimination research in data protection.

  14. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  15. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  16. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs. PMID:24481718

  17. Targeted and anonymized smartphone-based public health interventions in a participatory sensing system.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2014-01-01

    Public health interventions comprising information dissemination to affect behavioral adjustment have long been a significant component of public health campaigns. However, there has been limited development of public health intervention systems to make use of advances in mobile computing and telecommunications technologies. Such developments pose significant challenges to privacy and security where potentially sensitive data may be collected. In our previous work we identified and demonstrated the feasibility of using mobile devices as anonymous public health data collection devices as part of a Health Participatory Sensing Network (HPSN). An advanced capability of these networks extended in this paper would be the ability to distribute, apply, report on and analyze the usage and effectiveness of targeted public health interventions in an anonymous way. In this paper we describe such a platform, its place in the HPSN and demonstrate its feasibility through an implementation. PMID:25570789

  18. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  19. Distributed anonymous data perturbation method for privacy-preserving data mining

    Institute of Scientific and Technical Information of China (English)

    Feng LI; Jin MA; Jian-hua LI

    2009-01-01

    Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.

  20. A new authentication protocol for revocable anonymity in ad-hoc networks

    OpenAIRE

    Wierzbicki, Adam; Zwierko, Aneta; Kotulski, Zbigniew

    2005-01-01

    This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds th...

  1. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    OpenAIRE

    Hong Lai; Jinghua Xiao; Lixiang Li; Yixian Yang

    2012-01-01

    We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary a...

  2. 7-year trajectories of Alcoholics Anonymous attendance and associations with treatment

    OpenAIRE

    Kaskutas, Lee Ann; Bond, Jason; AVALOS, Lyndsay AMMON

    2009-01-01

    Although many members of Alcoholics Anonymous (AA) are introduced to AA during treatment, the relationship between treatment and AA attendance over time is unknown. This paper describes four latent classes of AA attendance among 586 dependent alcoholics interviewed by telephone 1, 3, 5 and 7 years after baseline, and models the relationship between treatment exposure and AA attendance in each class. There was a low AA group (averaging fewer than 5 meetings at most follow-ups), a medium AA gro...

  3. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  4. SW-SDF Based Personal Privacy with QIDB-Anonymization Method

    Directory of Open Access Journals (Sweden)

    Kiran P

    2012-08-01

    Full Text Available Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values that are present in the private data base do not require privacy preservation since the record owner sensitivity is a general one. So there are only few records in the entire distribution that require privacy. For example a record owner having disease flu doesn’t mind revealing his identity as compared to record owner having disease cancer. Even in this some of the record owners who have cancer are ready to reveal their identity, this is the motivation for SW-SDF based Personal Privacy. In this paper we propose a novel personalized privacy preserving technique that over comes the disadvantages of previous personalized privacy and other anonymization techniques. The core of this method can be divided in to two major components. The first component deals with additional attribute used in the table which is in the form of flags which can be used to divide sensitive attribute. Sensitive Disclosure Flag (SDF determines whether record owner sensitive information is to be disclosed or whether privacy should be maintained. The second flag that we are using is Sensitive Weigh (SW which indicates how much sensitive the attribute value is as compared with the rest. Second section deals with a novel representation called Frequency Distribution Block (FDB and Quasi–Identifier Distribution Block(QIDB which is used in anonymization. Experimental result show that it has lesser information loss and faster execution time as compared with existing methods.

  5. An anonymous reputation mechanism for cloud computing networks using volunteer resources

    OpenAIRE

    Aguilar Morillo, Miriam

    2011-01-01

    One of the major problems when using non-dedicated volunteer resources in a distributed network is the high volatility of these hosts since they can go offline or become unavailable at any time without control. Furthermore, the use of volunteer resources implies some security issues due to the fact that they are generally anonymous entities which we know nothing about. So, how to trust in someone we do not know?. Over the last years an important number of reputation-based tr...

  6. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  7. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy. PMID:21532265

  8. Anonymity, Reciprocity, and Conformity: Evidence from Voluntary Contributions to a National Park in Costa Rica

    OpenAIRE

    Alpizar, Francisco; Carlson, Fredrik; Johansson-Stenman, Olof

    2008-01-01

    We investigated the role of anonymity, reciprocity, and conformity for voluntary contributions, based on a natural field experiment conducted at a national park in Costa Rica. Contributions made in public in front of the solicitor were 25 percent higher than contributions made in private. Giving subjects a small gift before requesting a contribution increased the likelihood of a positive contribution. At the same time, however, the conditional contribution decreased. The total effect of givin...

  9. Decentralized Formation Control for Small-Scale Robot Teams with Anonymity

    OpenAIRE

    Lee, Geunho; Nak Young, Chong

    2009-01-01

    This paper presents decentralized formation controls for a team of anonymous mobile robots performing a task through cooperation. Robot teams are required to generate and maintain various geometric patterns adapting to environmental changes in many cooperative robotics applications. In particular, all robots must continue to strive toward achieving the team’s mission even if some members fail to perform their role. Toward this end, formation control approaches are proposed under the condition...

  10. Tourism and spaces of anonymity: An Israeli lesbian woman's travel experience

    OpenAIRE

    Poria, Yaniv

    2006-01-01

    This study examines an Israeli lesbian woman's travel experience based on the analysis of her published diary. The comparison of her experience and attitudes towards various spaces (e.g. her apartment, open spaces near her home, and locations in which she is involved in tourist activity) suggests that her perception of the space as 'free from people she knows' allows her and her partner to benefit from anonymity, live a lesbian lifestyle and benefit from sense of existential...

  11. Social Esteem versus Social Stigma: the role of anonymity in an income reporting game.

    OpenAIRE

    Sandro Casal; Luigi Mittone

    2014-01-01

    When the phenomenon of tax evasion is discussed, both scholars and authorities agree on the fact that, although essential, classical enforcements are not enough to ensure tax compliance: some other forms of incentives must be adopted. The paper’s aim is to experimentally test the role of different non- monetary incentives for tax compliance: participants have been treated with different experimental conditions, which differ in the role played by anonymity. Indeed, subjects have been informed ...

  12. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    OpenAIRE

    Adriaan R. Soetevent

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When using baskets, attendants' contributions can be identified by their direct neighbors, and attendants can observe the total amount given by the people who preceded them. Initially, contributions to...

  13. Robust ``pro-poorest'' poverty reduction with counting measures: the non-anonymous case

    OpenAIRE

    José V. Gallegos; Gaston Yalonetzky

    2014-01-01

    When measuring poverty with counting measures, are there conditions ensuring that poverty reduction not only reduces the average poverty score further but also decreases deprivation inequality among the poor more, thereby emphasizing improvements among the poorest of the poor? In the case of a non-anonymous assessment, i.e. when we can track poverty experiences of the same individuals or households using panel datasets, we derive three conditions whose fulfillment allows us to conclude that m...

  14. Robust ``pro-poorest'' poverty reduction with counting measures: The anonymous case

    OpenAIRE

    José V. Gallegos; Gaston Yalonetzky

    2015-01-01

    When measuring poverty with counting measures, it is worth inquiring into the conditions prompting poverty reduction which not only reduce the average poverty score further but also decrease deprivation inequality among the poor, thereby emphasizing improvements among the poorest of the poor. For comparisons of cross-sectional datasets of the same society in different periods of time (i.e. an anonymous assessment), Lasso de la Vega (2010) and Alkire and Foster (2011) developed a first-order d...

  15. Why are they hiding ? Study of an Anonymous File Sharing System

    OpenAIRE

    Cunche, Mathieu; Kaafar, Mohamed Ali; Chen, Terence; Boreli, Roksana; Mahanti, Anirban

    2012-01-01

    International audience This paper characterizes a recently proposed anonymous file sharing system, OneSwarm. This characterisation is based on measurement of several aspects of the OneSwarm system such as the nature of the shared and searched content and the geolocation and number of users. Our findings indicate that, as opposed to common belief, there is no significant difference in downloaded content between this system and the classical BitTorrent ecosystem. We also found that a majorit...

  16. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  17. The Impact of Alcoholics Anonymous on other substance abuse related Twelve Step programs

    OpenAIRE

    Laudet, Alexandre B.

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the 12-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery 12-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug dependent populations, many of whom are cross-addi...

  18. 一种基于SPKI的匿名支付方案%An Anonymous Payment Scheme Based on SPKI

    Institute of Scientific and Technical Information of China (English)

    朱庆生; 李唯唯; 王茜; 傅鹤岗

    2003-01-01

    SPKI is a proposed standard for public-key certificates. One important property of SPKI is that SPKI is key-oriented rather than name-oriented, and the public-key is globally unique. In this paper we propose an anonymous paymentscheme based on SPKI aiming at the problem of anonymous payment in B2C e-commerce. In the scheme we use the key-oriented characteristic of SPKI to link the public key to the account, and use authorization certificates to pay. The scheme achieves the anonymity very well.

  19. Comparison of two methods for measuring γ-H2AX nuclear fluorescence as a marker of DNA damage in cultured human cells: applications for microbeam radiation therapy

    International Nuclear Information System (INIS)

    Microbeam radiation therapy (MRT) delivers single fractions of very high doses of synchrotron x-rays using arrays of microbeams. In animal experiments, MRT has achieved higher tumour control and less normal tissue toxicity compared to single-fraction broad beam irradiations of much lower dose. The mechanism behind the normal tissue sparing of MRT has yet to be fully explained. An accurate method for evaluating DNA damage, such as the γ-H2AX immunofluorescence assay, will be important for understanding the role of cellular communication in the radiobiological response of normal and cancerous cell types to MRT. We compare two methods of quantifying γ-H2AX nuclear fluorescence for uniformly irradiated cell cultures: manual counting of γ-H2AX foci by eye, and an automated, MATLAB-based fluorescence intensity measurement. We also demonstrate the automated analysis of cell cultures irradiated with an array of microbeams. In addition to offering a relatively high dynamic range of γ-H2AX signal versus irradiation dose ( > 10 Gy), our automated method provides speed, robustness, and objectivity when examining a series of images. Our in-house analysis facilitates the automated extraction of the spatial distribution of the γ-H2AX intensity with respect to the microbeam array — for example, the intensities in the peak (high dose area) and valley (area between two microbeams) regions. The automated analysis is particularly beneficial when processing a large number of samples, as is needed to systematically study the relationship between the numerous dosimetric and geometric parameters involved with MRT (e.g., microbeam width, microbeam spacing, microbeam array dimensions, peak dose, valley dose, and geometric arrangement of multiple arrays) and the resulting DNA damage.

  20. High-level genetic diversity and complex population structure of Siberian apricot (Prunus sibirica L. in China as revealed by nuclear SSR markers.

    Directory of Open Access Journals (Sweden)

    Zhe Wang

    Full Text Available Siberian apricot (Prunus sibirica L., an ecologically and economically important tree species with a high degree of tolerance to a variety of extreme environmental conditions, is widely distributed across the mountains of northeastern and northern China, eastern and southeastern regions of Mongolia, Eastern Siberia, and the Maritime Territory of Russia. However, few studies have examined the genetic diversity and population structure of this species. Using 31 nuclear microsatellites, we investigated the level of genetic diversity and population structure of Siberian apricot sampled from 22 populations across China. The number of alleles per locus ranged from 5 to 33, with an average of 19.323 alleles. The observed heterozygosity and expected heterozygosity ranged from 0.037 to 0.874 and 0.040 to 0.924 with average values of 0.639 and 0.774, respectively. A STRUCTURE-based analysis clustered all of the populations into four genetic clusters. Significant genetic differentiation was observed between all population pairs. A hierarchical analysis of molecular variance attributed about 94% of the variation to within populations. No significant difference was detected between the wild and semi-wild groups, indicating that recent cultivation practices have had little impact on the genetic diversity of Siberian apricot. The Mantel test showed that the genetic distance among the populations was not significantly correlated with geographic distance (r = 0.4651, p = 0.9940. Our study represents the most comprehensive investigation of the genetic diversity and population structure of Siberian apricot in China to date, and it provides valuable information for the collection of genetic resources for the breeding of Siberian apricot and related species.

  1. A Review on anonymization approach to preserve privacy of Published data through record elimination

    Directory of Open Access Journals (Sweden)

    Isha K. Gayki

    2013-11-01

    Full Text Available Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack.

  2. On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies

    Directory of Open Access Journals (Sweden)

    Mohammad Rasool Sarrafi Aghdam

    2015-05-01

    Full Text Available K-anonymity is the model that is widely used to protect the privacy of individuals in publishing micro-data. It could be defined as clustering with constrain of minimum k tuples in each group. K-anonymity cuts down the linking confidence between sensitive information and specific individual by the ration of 1/k. However, the accuracy of the data in k-anonymous dataset decreases due to information loss. Moreover, most of the current approaches are for numerical attributes or in case of categorical attributes they require extra information such as attribute hierarchical taxonomies which often do not exist. In this paper we propose a new model, based on clustering, defining the distance between tuples including numerical and categorical attributes which does not require extra information and present the SpatialDistance (SD heuristic algorithm. Comparisons of experimental results on real datasets between SD algorithm and existing well-known algorithms show that SD performs the best and offers much higher data utility and reduces the information loss significantly.

  3. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  4. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  5. Alcoholics Anonymous

    Science.gov (United States)

    ... New Zealand Nicaragua Norway Panama Papua New Guinea Paraguay Peru Philippines Poland Portugal Romania Russia Singapore Slovakia ... Grapevine & La Viña Magazines Contributions & Self-Support Archives & History Press / Media Videos and Audios A.A. General ...

  6. Analysis of Drugs of Abuse in Anonymously Collected Urine and Soil samples from a Music Festival in Scandinavia

    OpenAIRE

    Mardal, Marie; Ramin, Pedram; Plósz, Benedek G.; Maurer, Hans H.; Meyer, Markus R.

    2014-01-01

    Aim: Pooled human urine and soil from urinating spots were collected anonymously at a Scandinavian music festival. Samples should be screened for drugs of abuse, particularly novel psychoactive substances (NPS), but also therapeutic drugs and ethanol. Methods: Twenty-one urine samples were collected anonymously from urinal and HMMA-d3 and trimipramin-d3 were added as internal standards. Additionally, 12 soil samples were collected near fences where people urinated. Urine samples were processe...

  7. Probability-based location anonymity algorithm%利用概率的位置匿名算法

    Institute of Scientific and Technical Information of China (English)

    闫玉双; 谭示崇; 赵大为

    2015-01-01

    k匿名模型是一种有效的位置隐私保护技术,通过构造包含需要保护的用户在内的 k 个正在发送请求的用户的匿名区域,达到保护用户位置的目的。但是现有的 k匿名模型仅能利用当前正在发送请求的用户,当同时发送请求用户较少时,就会导致匿名区域过大。为此,提出一种利用概率的位置匿名算法来保护路网中的移动用户的位置,利用当前时刻的不活跃用户的历史位置轨迹,计算出进入匿名路段的概率,可明显减小匿名路段长度。实验结果证明,基于概率的位置匿名算法与一般的 k 匿名模型相比较,提高了匿名效率。%As one of the most effective location privacy preservation technologies , the k‐anonymity model provides safeguards for location privacy of the mobile client against vulnerabilities for abuse by constructing an anonymous area of k users including the protected one . However , most existing k‐anonymity models only utilize the users who are sending requests at recent time . If there are not enough requesting users , the generated anonymous area of the k‐anonymity model will be larger than expected . In this paper , a Probability‐based Location Anonymity ( PLA ) algorithm is proposed for protecting location privacy of the mobile users in a road network . The PLA model takes advantage of the historical path track of the users who are not sending the request currently , and then computes the probability into the anonymous section so that it can greatly reduce the size of the anonymous area . Experimental results show that the PLA algorithm is superior to the k‐anonymity and it increases its anonymous efficiency enormously .

  8. Development and Characterization of Novel SSR Markers in Carrot (Daucus Carota L.) and Their Application for Mapping and Diversity Analysis in Apiaceae

    Science.gov (United States)

    Genomic resources in carrot and other Apiaceae are relatively underdeveloped. The availability of a large set of pcr-based codominant markers, such as simple sequence repeats (SSR), would allow integration of the different carrot genetic maps constructed to date (mainly using anonymous dominant mark...

  9. Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption

    OpenAIRE

    Onwuzurike, Lucky; De Cristofaro, Emiliano

    2015-01-01

    As social networking takes to the mobile world, smartphone apps provide users with ever-changing ways to interact with each other. Over the past couple of years, an increasing number of apps have entered the market offering end-to-end encryption, self-destructing messages, or some degree of anonymity. However, little work thus far has examined the properties they offer. To this end, this paper presents a taxonomy of 18 of these apps: we first look at the features they promise in their appeal ...

  10. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    OpenAIRE

    Thorben Burghardt; Klemens Bohm; Achim Guttmann; Chris Clifton

    2011-01-01

    Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper stu...

  11. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan

    2015-01-01

    In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that th...

  12. An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity

    Science.gov (United States)

    Li, Wei; Fan, Ming-Yu; Wang, Guang-Wei

    2012-12-01

    In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed. In this scheme a message to be signed is coded with unitary operators. Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message. Combining the entangled states generated by the TTP's Bell measurement with the signature information, the verifier can verify the authentication of a signature through a single quantum state measurement. Compared with previous schemes, our scheme is more efficient and less complex, furthermore, our scheme can ensure the anonymity of the signer.

  13. The Anonymous Plotter in the Routines of Renaissance Theatre and Drama

    OpenAIRE

    Paola Pugliatti

    2012-01-01

    Renaissance theatre, both in England and Italy, was a commercial enterprise and, therefore, it utilized procedures of division of labour to meet the challenge of the market. One of these procedures was the compilation of preparatory texts of various kinds. But, while about one thousand scenari of the commedia dell’arte (some anonymous, some with the author’s name) survive, of the ‘plots’ compiled by the English ‘plotters’ in preparation of plays to be written only one incomplete specimen and ...

  14. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  15. Nuclear rDNA pseudogenes in Chagas disease vectors: evolutionary implications of a new 5.8S+ITS-2 paralogous sequence marker in triatomines of North, Central and northern South America.

    Science.gov (United States)

    Bargues, M Dolores; Zuriaga, M Angeles; Mas-Coma, Santiago

    2014-01-01

    A pseudogene, paralogous to rDNA 5.8S and ITS-2, is described in Meccus dimidiata dimidiata, M. d. capitata, M. d. maculippenis, M. d. hegneri, M. sp. aff. dimidiata, M. p. phyllosoma, M. p. longipennis, M. p. pallidipennis, M. p. picturata, M. p. mazzottii, Triatoma mexicana, Triatoma nitida and Triatoma sanguisuga, covering North America, Central America and northern South America. Such a nuclear rDNA pseudogene is very rare. In the 5.8S gene, criteria for pseudogene identification included length variability, lower GC content, mutations regarding the functional uniform sequence, and relatively high base substitutions in evolutionary conserved sites. At ITS-2 level, criteria were the shorter sequence and large proportion of insertions and deletions (indels). Pseudogenic 5.8S and ITS-2 secondary structures were different from the functional foldings, different one another, showing less negative values for minimum free energy (mfe) and centroid predictions, and lower fit between mfe, partition function, and centroid structures. A complete characterization indicated a processed pseudogenic unit of the ghost type, escaping from rDNA concerted evolution and with functionality subject to constraints instead of evolving free by neutral drift. Despite a high indel number, low mutation number and an evolutionary rate similar to the functional ITS-2, that pseudogene distinguishes different taxa and furnishes coherent phylogenetic topologies with resolution similar to the functional ITS-2. The discovery of a pseudogene in many phylogenetically related species is unique in animals and allowed for an estimation of its palaeobiogeographical origin based on molecular clock data, inheritance pathways, evolutionary rate and pattern, and geographical spread. Additional to the technical risk to be considered henceforth, this relict pseudogene, designated as "ps(5.8S+ITS-2)", proves to be a valuable marker for specimen classification, phylogenetic analyses, and systematic

  16. Ceramic subsurface marker prototypes

    Energy Technology Data Exchange (ETDEWEB)

    Lukens, C.E. [Rockwell International Corp., Richland, WA (United States). Rockwell Hanford Operations

    1985-05-02

    The client submitted 5 sets of porcelain and stoneware subsurface (radioactive site) marker prototypes (31 markers each set). The following were determined: compressive strength, thermal shock resistance, thermal crazing resistance, alkali resistance, color retention, and chemical resistance.

  17. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  18. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

    CERN Document Server

    Mittal, Prateek; Juen, Joshua; Caesar, Matthew; Borisov, Nikita

    2011-01-01

    Anonymity systems such as Tor aim to enable users to communicate in a manner that is untraceable by adversaries that control a small number of machines. To provide efficient service to users, these anonymity systems make full use of forwarding capacity when sending traffic between intermediate relays. In this paper, we show that doing this leaks information about the set of Tor relays in a circuit (path). We present attacks that, with high confidence and based solely on throughput information, can (a) reduce the attacker's uncertainty about the bottleneck relay of any Tor circuit whose throughput can be observed, (b) exactly identify the guard relay(s) of a Tor user when circuit throughput can be observed over multiple connections, and (c) identify whether two concurrent TCP connections belong to the same Tor user, breaking unlinkability. Our attacks are stealthy, and cannot be readily detected by a user or by Tor relays. We validate our attacks using experiments over the live Tor network. We find that the at...

  19. Implementation of Fair-exchange and Anonymous Online E-cash Protocol for E-commerce

    Directory of Open Access Journals (Sweden)

    Harshita

    2016-08-01

    Full Text Available In the world of internet, e-commerce is one of the most prominent sectors where user wants to shop and pay online for online products. E-cash is one of these payment methods. In e-cash, every time a unique string is generated for user so that user uses that string to pay for any online product. At the time of online purchasing a trust should be maintain between customers and merchant such that the product price which is going to pay by customer is fair or not, the merchant is indeed genuine to deliver the product after getting online payment or not. Trust issues are resolved by using fair exchange concept at the time of online purchasing. Anonymity is also a major concern; it means that true identity of users must be hidden from merchant. By keeping these issues in mind we proposed a protocol which ensures users anonymity by using e-cash payment method and fair exchange by using off-line TTP which invokes by customer when any dispute occur from merchant side. In this paper, we implement our proposed protocol and also analyze its performance and compare it with other protocol.

  20. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Directory of Open Access Journals (Sweden)

    Christine Clavien

    Full Text Available Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  1. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Science.gov (United States)

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms. PMID:26939060

  2. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    Science.gov (United States)

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  3. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic. PMID:24146334

  4. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Science.gov (United States)

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  5. A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    A.Damodaram

    2012-10-01

    Full Text Available With the economy developing and popular Internet, the general concept of contract signing has changed.In the past, people usually sign a contract at the same time and same place face to face, but actually eachparty involved in contract may live in different part of earth, they want to sign something for business orsome other things in economic, efficient, secure and fairway. A fair contract signing protocol allows twopotentially mis-trusted parities to exchange their commitments (i.e., digital signatures to an agreedcontract over the Internet in a fair way, so that either each of them obtains the other’s signature, orneither party does. Based on the LUCAS signature scheme, a new digital anonymous contract signingprotocol is proposed in this paper. Like the existing LUCAS-based solutions for the same problem, ourprotocol is fair, anonymous and optimistic. Furthermore, the proposed protocol satisfied a newproperty, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, either of the two partiescan not show the validity of intermediate results to others.

  6. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    Science.gov (United States)

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month. PMID:27442957

  7. The Anonymous Plotter in the Routines of Renaissance Theatre and Drama

    Directory of Open Access Journals (Sweden)

    Paola Pugliatti

    2012-03-01

    Full Text Available Renaissance theatre, both in England and Italy, was a commercial enterprise and, therefore, it utilized procedures of division of labour to meet the challenge of the market. One of these procedures was the compilation of preparatory texts of various kinds. But, while about one thousand scenari of the commedia dell’arte (some anonymous, some with the author’s name survive, of the ‘plots’ compiled by the English ‘plotters’ in preparation of plays to be written only one incomplete specimen and a few fragments have been preserved; their nature, therefore, remains dubious. Furthermore, anonymous documents of a different nature, also confusingly called ‘plots’, but compiled as reminders for the actors’ entrances during performance, have survived in six, mostly fragmentary, manuscripts. This article discusses these three kinds of preparatory texts in order to characterize their different nature and argues that, although suggestive, the idea of a derivation of the two kinds of English ‘plots’ from the scenari appears unconvincing; indeed, the compilation, in both contexts, of preparatory texts was simply an obvious and necessary measure in order to speed up procedures.

  8. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  9. CREATION A MATHEMATICAL MODEL, THAT PROVIDES A SUFFICIENT LEVEL OF ANONYMITY IN E-VOTING SYSTEM WITH THE INTEGRITY AND PRIVACY OF TRANSMITTED DATA

    Directory of Open Access Journals (Sweden)

    Ugryumov D. V.

    2013-11-01

    Full Text Available The article presents the results of an analytical review of existing methods to ensure anonymity, the study of the system architecture of the electronic voting, and presented the author’s idea to improve the client's anonymity in such systems. The result is a mathematical model, that provides a sufficient level of anonymity in electronic voting system to preserve the integrity and confidentiality of transmitted data

  10. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  11. Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration

    Science.gov (United States)

    Zhong, Yingqin; Liu, Na; Lim, John

    The important role of attitude in the acceptance and diffusion of technology has been widely acknowledged. Greater research efforts have been called for examining the relationships between cultural variables and attitude toward technology. In this regard, this study investigates the impact of cultural orientation (focusing on an individual's degree of collectivism) on attitude toward e-collaboration technology. A theoretical model is proposed and subsequently tested using a questionnaire survey involving 236 data points. Self-reliance, competitive success, and group work orientation are found as significant indicators reflecting an individual's degree of collectivism, which in turn influences willingness to participate, evaluation of collaborative effort, and preference for anonymity feature. Subsequently, the three variables are found to affect perceptions about decision quality, enjoyment, uncertainty, and pressure in e-collaboration.

  12. Inseminação artificial e anonimato do doador Artificial insemination and donor anonymity

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Demasi Wanssa

    2010-12-01

    Full Text Available Através desse trabalho, objetiva-se abordar o tema de doação de gametas e do anonimato envolvendo este ato na reprodução medicamente assistida. Analisando rapidamente o caráter técnico da doação e seleção dos gametas e a necessidade de uma legislação específica sobre o assunto nos diferentes países do mundo que adotaram esse método, diante da pluralidade social existente. Consideram-se os aspectos éticos e legais vigentes no Brasil ditados pela Resolução do Conselho Federal de Medicina n° 1.358/93 que determina as condutas dos médicos brasileiros e define, dentre outros aspectos, o da doação e do anonimato, envolvendo o aspecto autonomia. A necessidade de proteção dos sujeitos através do termo de consentimento informado ou de recusa informada, permitindo garantir a informação e esclarecimento necessário ao casal que decide submeter-se aos planos de reprodução medicamente assistida assim como ao doador que, por sua vez, também deve dar garantias escritas quanto à espontaneidade e à alienação dos direitos sobre os gametas à instituição que se torna a responsável por estes. Tudo isso, aliado à veracidade e confidencialidade, compõe os elementos fundamentais para a manutenção do anonimato entre o doador e o receptor. Anonimato este, ainda muito discutido pelos estudiosos de diversas áreas e países.This article aims to address the issue of the donation of gametes and the anonymity involved in this act of medically-assisted reproduction. It briefly discusses the technical aspects of the donation and selection of gametes and the need for specific legislation on the issue in various countries that have adopted this method, in view of the plurality of different social systems in the world today. The article addresses the legal and ethical issues that are currently being aired in Brazil, and the rulings contained in the Federal Medical Council Resolution 1,358/93, which rules on the conduct of physicians in

  13. DEVELOPING AND MODELING A NEW E-LOTTERY SYSTEM USING ANONYMOUS SIGNATURES

    Directory of Open Access Journals (Sweden)

    FLORIN MEDELEANU

    2016-06-01

    Full Text Available In traditional lottery systems, the players choose some numbers on a ticket, enroll it to the lottery organizer and pay an amount of money for it. But this perspective offers no guarantee to the players that the lottery organizer doesn’t manipulate the number selection in order to pay the least. This suspicion could be avoided if the lottery organizer didn’t know the numbers selected by the players before the draw. Such a system is possible to be realized by using anonymous signatures, but the design should also guarantee that forging lottery tickets after the moment of the draw or claim of a different ticket is not possible. This paper will propose and analyze a model in order to fulfill all requirement described before, using several cryptographic primitives

  14. ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING

    Directory of Open Access Journals (Sweden)

    V.Rajalakshmi

    2013-07-01

    Full Text Available Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data,since there is a trade-off between privacy preservation and information loss which will subsequently affect the result of data mining. The method that is proposed in this paper is based on nested clustering of data andperturbation on each cluster. The size of clusters is kept optimal to reduce the information loss. The paper explains the methodology, implementation and results of nested clustering. Various metrics are also provided to explicate that this method overcomes the disadvantages of other perturbation methods.

  15. Embryonic Stem Cell Markers

    OpenAIRE

    Lan Ma; Liang Li; Wenxiu Zhao; Xiang Ji; Fangfang Zhang

    2012-01-01

    Embryonic stem cell (ESC) markers are molecules specifically expressed in ES cells. Understanding of the functions of these markers is critical for characterization and elucidation for the mechanism of ESC pluripotent maintenance and self-renewal, therefore helping to accelerate the clinical application of ES cells. Unfortunately, different cell types can share single or sometimes multiple markers; thus the main obstacle in the clinical application of ESC is to purify ES cells from other type...

  16. An Anonymous Survey of Psychosomatic Medicine Fellowship Directors regarding Breaches of Contracts and a Proposal for Prevention

    Science.gov (United States)

    Levenson, James L.; Bialer, Philip

    2010-01-01

    Objective: The authors studied how often applicants accept positions at more than one program, or programs offer positions to applicants who have already signed contracts with other programs. Methods: An anonymous survey was distributed to all psychosomatic medicine fellowship program directors. Results: It is fairly common for applicants to sign…

  17. Questioning the Use of Alcoholics Anonymous with College Students: Is an Old Concept the Only Alternative for a New Generation?

    Science.gov (United States)

    Vick, Ron, Sr.

    2000-01-01

    The recommended treatment for alcoholism in the past typically has been participation in Alcoholics Anonymous (AA). However, the use of AA on college campuses has not been proven effective. With a new generation comes the opportunity to rethink this approach to the problem of alcohol abuse on campuses and to incorporate new methods in counseling…

  18. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset.

    Science.gov (United States)

    Zhang, Haitao; Chen, Zewei; Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users' privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  19. Increasing Anonymity in Peer Assessment by Using Classroom Response Technology within Face-to-Face Higher Education

    Science.gov (United States)

    Raes, Annelies; Vanderhoven, Ellen; Schellens, Tammy

    2015-01-01

    Peer assessment is becoming more popular in higher education, however it often goes together with undesirable social effects like peer pressure and favoritism, especially when students need to evaluate peers in a face-to-face setting. The present study was set up to investigate increased anonymity in peer assessment to counter these undesirable…

  20. Attachment Styles and Changes among Women Members of Overeaters Anonymous Who Have Recovered from Binge-Eating Disorder

    Science.gov (United States)

    Hertz, Pnina; Addad, Moshe; Ronel, Natti

    2012-01-01

    In Overeaters Anonymous (OA), the 12-step self-help program for compulsive overeaters, binge eating is regarded as a physical, spiritual, and emotional disorder. Consequently, the program proposes recovery through the adoption of a lifestyle that leads to physical, spiritual, and emotional well-being. A qualitative phenomenological study that…

  1. From anonymity to “open doors”: IRB responses to tensions with researchers

    Directory of Open Access Journals (Sweden)

    Klitzman Robert

    2012-07-01

    Full Text Available Abstract Background Tensions between IRBs and researchers in the US and elsewhere have increased, and may affect whether, how, and to what degree researchers comply with ethical guidelines. Yet whether, how, when, and why IRBs respond to these conflicts have received little systematic attention. Findings I contacted 60 US IRBs (every fourth one in the list of the top 240 institutions by NIH funding, and interviewed leaders from 34 (response rate = 55% and an additional 12 members and administrators. IRBs often try to respond to tensions with researchers and improve relationships in several ways, but range widely in how, when, and to what degree (e.g., in formal and informal structure, content, and tone of interactions. IRBs varied from open and accessible to more distant and anonymous, and in the amount and type of “PR work” and outreach they do. Many boards seek to improve the quantity, quality, and helpfulness of communication with PIs, but differ in how. IRBs range in meetings from open to closed, and may have clinics and newsletters. Memos can vary in helpfulness and tone (e.g., using “charm”. IRBs range considerably, too, in the degrees to which they seek to educate PIs, showing them the underlying ethical principles. But these efforts take time and resources, and IRBs thus vary in degrees of responses to PI complaints. Conclusions This study, the first to explore the mechanisms through which IRBs respond to tensions and interactions with PIs, suggests that these committees seek to respond to conflicts with PIs in varying ways – both formal and informal, involving both the form and content of communications. This study has important implications for future practice, research, and policy, suggesting needs for increased attention to not only what IRBs communicate to PIs, but how (i.e., the tone and the nature of interactions. IRBs can potentially improve relationships with PIs in several ways: using more “open doors” rather

  2. Embryonic Stem Cell Markers

    Directory of Open Access Journals (Sweden)

    Lan Ma

    2012-05-01

    Full Text Available Embryonic stem cell (ESC markers are molecules specifically expressed in ES cells. Understanding of the functions of these markers is critical for characterization and elucidation for the mechanism of ESC pluripotent maintenance and self-renewal, therefore helping to accelerate the clinical application of ES cells. Unfortunately, different cell types can share single or sometimes multiple markers; thus the main obstacle in the clinical application of ESC is to purify ES cells from other types of cells, especially tumor cells. Currently, the marker-based flow cytometry (FCM technique and magnetic cell sorting (MACS are the most effective cell isolating methods, and a detailed maker list will help to initially identify, as well as isolate ESCs using these methods. In the current review, we discuss a wide range of cell surface and generic molecular markers that are indicative of the undifferentiated ESCs. Other types of molecules, such as lectins and peptides, which bind to ESC via affinity and specificity, are also summarized. In addition, we review several markers that overlap with tumor stem cells (TSCs, which suggest that uncertainty still exists regarding the benefits of using these markers alone or in various combinations when identifying and isolating cells.

  3. Cross-species amplification of nuclear EST-microsatellites developed for other Pinus species in Pinus nigra

    Directory of Open Access Journals (Sweden)

    Šarac Zorica

    2015-01-01

    Full Text Available Due to the current lack of nuclear microsatellites (simple sequence repeats - SSRs specifically developed for Pinus nigra, an important European coniferous species, we cross-species amplified 12 EST-SSRs (expressed sequence tagged SSRs developed for other Pinus species in P. nigra in order to delineate loci which can be used for assessing levels of genetic diversity and genetic structuring in this species. We amplified these loci in individuals from seven populations from the central Balkans representing four recognized infraspecific taxa of P. nigra (ssp. nigra, var. gocensis, ssp. pallasiana, and var. banatica. Contrary to expectations on high transferability of EST-SSRs into related species, only three out of 12 tested loci were successfully amplified in P. nigra, but they displayed lack/low levels of polymorphism or generated multilocus amplification products. Thus, our estimates on levels of genetic diversity (HE = 0.183 and genetic differentiation (FST = 0.007 were based on variability of a single locus harboring four alleles only and they should be taken with cautions. Our study highlights the need for the development of high-resolution molecular markers, such as co-dominant genic or genomic SSRs or predominantly biallelic SNPs, or utilization of anonymous dominant markers, such as AFLPs, for genotyping in P. nigra. [Projekat Ministarstva nauke Republike Srbije, br. 173029 i br. 173030

  4. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  5. Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment

    Directory of Open Access Journals (Sweden)

    Jun-jun Wu

    2012-09-01

    Full Text Available Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile terminal and further affect the security of mobile network. But the traditional access control and authentication mechanism cannot resolve such security issues. On the basis of trusted computing technology, we proposed a mobile trusted network architecture by extending the trusted network connection in mobile environment. And an improvement EAP-EHash method is used in the proposed architecture to implement authentication. We defined two service scenarios in the authentication scheme, home network authentication and roaming network authentication. The process of each scenario is described in detail. By introducing the pseudonym mechanism, our scheme can protect user identity. And the connection status not only depends on the identification process, but also the trust status of the platform. The analysis shows that our scheme benefits the properties of user identity anonymity, mutual authentication, fake agent resistance, platform integrity verification, EAP and TNC Compatible. And the ciphersuite negotiation makes our scheme more suitable for resource limited mobile terminals.

  6. Role of Plasmodium falciparum thrombospondin-related anonymous protein in host-cell interactions

    Directory of Open Access Journals (Sweden)

    Malhotra Pawan

    2008-04-01

    Full Text Available Abstract Background Thrombospondin-related anonymous protein (TRAP is essential for sporozoite motility and for liver cell invasion. TRAP is a type 1 membrane protein that possesses multiple adhesive domains in its extracellular region. Methods Plasmodium falciparum TRAP (PfTRAP and its subdomains were expressed in a mammalian expression system, and eleven different mutants generated to study interaction of PfTRAP with liver cells. Binding studies between HepG2 cell extracts and PfTRAP were performed using co-immunoprecipitation protocols. Results Five different amino acid residues of PfTRAP that are involved in liver cell binding have been identified. These PfTRAP mutants bound to heparin like the wild type PfTRAP thereby suggesting a non-heparin mediated binding of PfTRAP to liver cells. Three Src family proteins -Lyn, Lck and CrkL which interact with PfTRAP are also identified. Liver cell extracts and immunoprecipitated Src family kinases phosphorylated PfTRAP at multiple sites. An analysis of multiple TRAP sequences revealed Src homology 3 domain (SH3 binding motifs. Conclusion Binding of PfTRAP to SH3-domain containing proteins like Src-family kinases and their ability to phosphorylate PfTRAP suggests a novel role for PfTRAP in cell signaling during sporozoite invasion and homing inside the liver cells. These data shed new light on TRAP-liver cell interactions.

  7. OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITYBASED ENCRYPTION WITH ANONYMOUS KEY ISSUING

    Institute of Scientific and Technical Information of China (English)

    Xu Lingling; Zhang Fangguo; Wen Yamin

    2011-01-01

    In ACM'CCS 2009,Camenisch,et al.proposed the Obhvious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the simplified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.

  8. Personality Patterns in Narcotics Anonymous Members versus Individuals with Addiction Receiving Methadone Maintenance Therapy.

    Directory of Open Access Journals (Sweden)

    Shahin Akhondzadeh

    2014-09-01

    Full Text Available Therapeutic interventions can be classified into two distinct approaches: abstinent and maintenance method. Currently, there are no clear criteria for referring addicted patients to one of these modalities. We aimed to compare the personality characteristics of individuals with addiction who attended narcotics anonymous sessions with those who received methadone maintenance therapy.This was a cross- sectional study. The participants were NA members and patients who were undergoing methadone maintenance treatment in outpatient clinics. Using the randomized cluster sampling method, 200 individuals with opioid dependence were selected (each group 100 persons. Data were collected through a demographic questionnaire and the five-factor personality inventory (NEO-FFI. Comparison of the mean scores of NEO-PPI in the two groups was performed by independent t test, and qualitative variables were compared using the Chi-square test.We found a significant difference between the MMT and NA groups with respect to neuroticism, extroversion, and agreeableness. No significant difference was found in the subscales of conscientious and openness.People who regularly attended the NA sessions had lower neuroticism and higher agreeableness than patients who were under the maintenance modality. Whether this is the cause or effect of attending NA sessions requires future large-scale cohort studies.

  9. Identification of genes in anonymous DNA sequences. Annual performance report, February 1, 1991--January 31, 1992

    Energy Technology Data Exchange (ETDEWEB)

    Fields, C.A.

    1996-06-01

    The objective of this project is the development of practical software to automate the identification of genes in anonymous DNA sequences from the human, and other higher eukaryotic genomes. A software system for automated sequence analysis, gm (gene modeler) has been designed, implemented, tested, and distributed to several dozen laboratories worldwide. A significantly faster, more robust, and more flexible version of this software, gm 2.0 has now been completed, and is being tested by operational use to analyze human cosmid sequence data. A range of efforts to further understand the features of eukaryoyic gene sequences are also underway. This progress report also contains papers coming out of the project including the following: gm: a Tool for Exploratory Analysis of DNA Sequence Data; The Human THE-LTR(O) and MstII Interspersed Repeats are subfamilies of a single widely distruted highly variable repeat family; Information contents and dinucleotide compostions of plant intron sequences vary with evolutionary origin; Splicing signals in Drosophila: intron size, information content, and consensus sequences; Integration of automated sequence analysis into mapping and sequencing projects; Software for the C. elegans genome project.

  10. E-APSAR:Enhanced Anonymous Position Based Security Aware Routing Protocol For Manets

    Directory of Open Access Journals (Sweden)

    Priyanka Malgi

    2014-03-01

    Full Text Available In the past few years, we have seen a rapid expansion in the field of mobile computing due to the pro- liferation of inexpensive, widely available wireless devices or networks.However, all these networks are conventional wireless networks as they require a fixed network infrastructure with cen- tralised administration for their operation, potentially consuming a lot of time and money for set-up and maintenance.Drawbacks of conventional wireless networks are driving a new alternative way for mobile communication, in which mobile devices form a selfcreating, self-organising and self-administering wireless network, called a mobile ad hoc network.In mobile ad-hoc networking (MANETs, nodes communicate to each other based on public identities. In this paper,for a position based routing[22] an innovative packet forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack[8]. Proposed E-APSAR (Enhanced Anonymous Position Based security aware routing protocol is implemented on NS-2 and results shown significant improvement over original DSR in terms of various performance metrics. It has been found that on dense network certain numbers of malicious nodes are supportive to reducing communication overhead and because of density negative effect of malicious attacks which is proposed E-APSAR that is able to reduce. Hence result shows proposed E-APSAR will be helpful to decrease communication overhead.

  11. [Utilization of anonymous HIV testing by the federal health office--developments and motives].

    Science.gov (United States)

    Scheibner, J; Waldvogel, B

    1993-01-01

    In the state-run health office in Ulm a survey of the frequency of anonymous HIV-antibody tests was taken between 1985 to 1991, of the age and gender representation from 1988 to 1991, of the test motives from 1.1.1990 to 1.3.1991. The result was a regressive trend following the test boom of 1987 and 1988, which is becoming more and more stable. The relation of men and women has been amounting to 6:4 in the last four years; the proportion of women receding slightly but constantly. The main motive of being tested was finding out about a high-risk or potentially high-risk sexual contact, mostly at the beginning of a new partnership. The motive ranking second in frequency was the investigation of the consequences of blood exposure, mostly relating to medical work. The third place was taken by irrational anxieties as a test motive. The article discusses the fact that test at the beginning of a new partnership frequently have the meaning of a sacrifice and a symbol of bondage in combination with a vow to be faithful. In case of irrational anxieties about AIDS the test-counsellor gets a chance to diagnose a possibly neurotic development at a very early stage, so that painful and expensive chronification and generalisation could be stopped or eased. PMID:8435542

  12. Assessment Role of Participation in Narcotic Anonymous in Opiate Dependents during Abstinence

    Directory of Open Access Journals (Sweden)

    Hossien Zare

    2012-09-01

    Full Text Available Background: The activity level of Narcotics Anonymous group (NA is expanding in many countries, including Iran. Some research has confessed the benefits of 12-step NA approach compared with similar methods. In the present study, the role of regular participation of opioid addicts in the NA group was studied in terms of abstinence rate and compared with routine program of detoxification centers of the person Welfare Organization and Medical Sciences University. Materials and Methods: All addicts who attempted to quit in self-introducer clinical centers of Medical Sciences University and the Welfare Organization of Rafsanjan were suggested to participate and not to participate in NA, based on even and odd numbers, respectively. Among them, two equal 120-person (NA and control groups were selected, then evaluated every three months and followed up for 12 months. Their status was assessed through questionnaires, interviews, and morphine tests.Results: The purity rate of NA group with 8.49 months was significantly different with normal addicts in 5.19 months (p=0.001. The recurrence rate at 12 months was significantly lower in the NA group compared with the control group, calculated through independent t-test (p=0.001. Quitting history and addiction duration in the NA group was significantly higher than control group.Conclusion: The findings of the research support a better prognosis for participants of NA group. Further researches are recommended to provide useful clinical information for patients and professionals.

  13. [Immunological markers of rheumatoid arthritis].

    Science.gov (United States)

    Matuszewska, Agnieszka; Madej, Marta; Wiland, Piotr

    2016-03-25

    Rheumatoid arthritis (RA) is the most common connective tissue disease of autoimmune origin. The disease is characterized by chronic inflammation leading to bone erosions and organ involvement. RA is a progressive disease. It affects the quality of life, leading to disability and death mainly due to premature cardiovascular disease. Early diagnosis and appropriate treatment are essential for prognosis and quality of life improvement. In 2010 the American College of Rheumatology (ACR) and The European League Against Rheumatism (EULAR) established new RA classification criteria. Besides clinical symptoms it includes two immunologic criteria: rheumatoid factor (RF) and anti-citrullinated protein antibodies (anti-CCP antibodies). RF is the first well-known RA immunologic marker. It is observed in 80-85% of patients with RA. Elevated serum level of RF has been associated with increased disease activity, radiographic progression, and the presence of extraarticular manifestations. The sensitivity of RF is 50-90%, and specificity is 50-95%. Anti-CCP antibodies appear to be a more specific marker than RF. They are often present at the very beginning of the disease, or even years before the first symptoms. The prognostic value of anti-CCP antibodies is well established. High serum level of anti-CCP correlates with poor prognosis and early erosions of the joints. The sensitivity of anti-CCP2 is 48-80%, and specificity is 96-98%. New immunologic markers include anti-carbamylated protein antibodies (anti-CarP) and antibodies against heterogeneous nuclear ribonucleoproteins (anti-hnRNP A2/B1, RA33). Scientists aim to identify a highly sensitive and specific biomarker of the disease that not only has diagnostic and prognostic value but also may predict the response to treatment.

  14. Immunological markers of rheumatoid arthritis

    Directory of Open Access Journals (Sweden)

    Agnieszka Matuszewska

    2016-03-01

    Full Text Available Rheumatoid arthritis (RA is the most common connective tissue disease of autoimmune origin. The disease is characterized by chronic inflammation leading to bone erosions and organ involvement. RA is a progressive disease. It affects the quality of life, leading to disability and death mainly due to premature cardiovascular disease. Early diagnosis and appropriate treatment are essential for prognosis and quality of life improvement. In 2010 the American College of Rheumatology (ACR and The European League Against Rheumatism (EULAR established new RA classification criteria. Besides clinical symptoms it includes two immunologic criteria: rheumatoid factor (RF and anti-citrullinated protein antibodies (anti-CCP antibodies. RF is the first well-known RA immunologic marker. It is observed in 80-85% of patients with RA. Elevated serum level of RF has been associated with increased disease activity, radiographic progression, and the presence of extraarticular manifestations. The sensitivity of RF is 50-90%, and specificity is 50-95%. Anti-CCP antibodies appear to be a more specific marker than RF. They are often present at the very beginning of the disease, or even years before the first symptoms. The prognostic value of anti-CCP antibodies is well established. High serum level of anti-CCP correlates with poor prognosis and early erosions of the joints. The sensitivity of anti-CCP2 is 48-80%, and specificity is 96-98%. New immunologic markers include anti-carbamylated protein antibodies (anti-CarP and antibodies against heterogeneous nuclear ribonucleoproteins (anti-hnRNP A2/B1, RA33. Scientists aim to identify a highly sensitive and specific biomarker of the disease that not only has diagnostic and prognostic value but also may predict the response to treatment.

  15. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  16. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    Science.gov (United States)

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  17. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  18. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    Directory of Open Access Journals (Sweden)

    Kishonna Gray

    2015-06-01

    Full Text Available This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1 anonymity, 2 endless narrative, and 3 socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based multiplayer environments. More specifically, they explore how the three factors (i.e., anonymity; endless narrative; socialization relate to the prolonged and extended use within these virtual communities and highlight the multifaceted uses of traditional chat services, social media, and the convergence of media existing within these chat communities.

  19. Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community

    OpenAIRE

    Larsson, Stefan; Svensson, Måns; Kaminski, Marcin; Rönkkö, Kari; Alkan Olsson, Johanna

    2012-01-01

    Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through ...

  20. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    OpenAIRE

    Kishonna Gray; Wanju Huang

    2015-01-01

    This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1) anonymity, 2) endless narrative, and 3) socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based m...

  1. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  2. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.

  3. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  4. Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R Regin

    2015-12-01

    Full Text Available Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.

  5. Tumour markers in urology

    International Nuclear Information System (INIS)

    The same applies essentially also for the bladder carcinomas: There is no reliable marker for these cancers which would be useful for clinical purposes. TPA has proven to be too non-specific in malignoma-detection and therefore hardly facilitates clinical decision-making in individual cases. The CEA is not sensitive enough to be recommendable for routine application. However, in advanced stages a CEA examination may be useful if applied within the scope of therapeutic efforts made to evaluate efficacy. In cases of carcinomas of the prostate the sour prostate-specific phosphatase (SPP) and, more recently, especially the prostate-specific antigen (PSA) have proven in follow-up and therapy monitoring, whereby the PSA is superior to the SPP. Nevertheless, both these markers should be employed in therapy monitoring because differences in behaviour will be observed when the desired treatment effect is only achieved in one of the two markers producing tumour cell clonuses. Both markers, but especially the PSA, are quite reliably in agreement with the result of the introduced chemo-/hormone therapy, whereby an increase may be a sure indicator of relapse several months previous to clinical symptoms, imaging procedures, so-called routine laboratory results and subjective complaints. However, none of the 2 markers is appropriate for the purposes of screening or early diagnosis of carcinomas of the prostate. (orig.)

  6. Current status and features of the T-2 Nuclear Information Service

    International Nuclear Information System (INIS)

    This service is run by Group T-2 (Nuclear Theory and Applications) of the Theoretical Division of the Los Alamos National Laboratory, which is operated by the University of California for the US Department of Energy. The author works on nuclear modeling, nuclear data, cross sections, nuclear masses, ENDF, NJOY data processing, nuclear astrophysics, radioactivity, radiation shielding, data for medical radiotherapy, data for high-energy accelerator applications, data and codes for fission and fusion systems, and more. For an introduction to the field of nuclear data and his site, take his Guided Tour. Much of this information can also be accessed using anonymous ftp t2.lanl.gov

  7. Current status and features of the T-2 Nuclear Information Service

    Energy Technology Data Exchange (ETDEWEB)

    MacFarlane, R.E.

    1998-04-24

    This service is run by Group T-2 (Nuclear Theory and Applications) of the Theoretical Division of the Los Alamos National Laboratory, which is operated by the University of California for the US Department of Energy. The author works on nuclear modeling, nuclear data, cross sections, nuclear masses, ENDF, NJOY data processing, nuclear astrophysics, radioactivity, radiation shielding, data for medical radiotherapy, data for high-energy accelerator applications, data and codes for fission and fusion systems, and more. For an introduction to the field of nuclear data and his site, take his Guided Tour. Much of this information can also be accessed using anonymous ftp t2.lanl.gov.

  8. Survey of Anonymous Routing Protocols for Mobile Ad Hoc Networks%移动自组网的匿名路由协议研究综述

    Institute of Scientific and Technical Information of China (English)

    秦丰林; 葛连升; 刘琚; 段海新

    2009-01-01

    移动自组网中的恶意节点对路由协议的安全和隐匿具有严重威胁.现在针对安全路由协议的研究很多,但是很少有人涉及匿名性问题,匿名路由协议能够实现节点身份、位置和通信关系的隐匿,在军事和其它机密通信领域中具有重要意义.首先对匿名路由协议面临的攻击行为进行分析,介绍其定义、分类和匿名性评价方法,然后概括性的介绍已有的典型匿名路由协议,比较其匿名性和安全性,最后对以后研究的问题和方向作了总结和展望.%Malicious nodes in mobile ad hoc networks (MANETs) impose great threat on the security and anonymity of routing protocols. Although there is a huge amount of work in secure routing protocols, few focuses on anonymity problems recent years. Anonymous routing protocols are significantly important in military and other confidential areas because of their capability of hiding the node's identity, location and communication relations. In this paper, a detailed survey of existing literature on anonymous routing protocols is presented. Attack behaviois in anonymous routing protocols are first identified, and the strict definition, taxonomy and anonymity evaluation metrics are also introduced. Then several typical anonymous routing protocols are generally described and their performance on security and anonymity are analyzed and compared as well. At last, some main problems and possible directions for future research are summarized and discussed.

  9. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    Science.gov (United States)

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  10. Alcoholics anonymous and twelve steps%AA与戒酒的十二个步骤--访美国嗜酒者互诫协会札记

    Institute of Scientific and Technical Information of China (English)

    郭崧; 李冰

    2003-01-01

    @@ AA(Alcoholics Anonymous)的戒酒方案见诸于几乎所有有关药物依赖的教科书.在世界范围内,采纳AA十二个步骤的治疗原则来实现戒除成瘾性障碍的组织(如NA:Narcotics Anonymous,CA:CocaineAnonymous等)已超过250个.

  11. The Swift Turbidity Marker

    Science.gov (United States)

    Omar, Ahmad Fairuz; MatJafri, Mohd Zubir

    2011-01-01

    The Swift Turbidity Marker is an optical instrument developed to measure the level of water turbidity. The components and configuration selected for the system are based on common turbidity meter design concepts but use a simplified methodology to produce rapid turbidity measurements. This work is aimed at high school physics students and is the…

  12. Magik Markers Trehvis

    Index Scriptorium Estoniae

    2008-01-01

    Müra-rock'i viljelevast USA duost Magik Markers (ansambel osaleb režissöör Veiko Õunapuu uue mängufilmi "Püha Tõnu kiusamine" võtetel, kontsert 15. nov. Tartus klubis Trehv, vt. www.magikmarkers.audiosport.org.)

  13. Molecular characterization of a new Babesia bovis thrombospondin-related anonymous protein (BbTRAP2.

    Directory of Open Access Journals (Sweden)

    Mohamad Alaa Terkawi

    Full Text Available A gene encoding a Babesia bovis protein that shares significant degree of similarity to other apicomplexan thrombospondin-related anonymous proteins (TRAPs was found in the genomic database and designated as BbTRAP2. Recombinant protein containing a conserved region of BbTRAP2 was produced in E. coli. A high antigenicity of recombinant BbTRAP2 (rBbTRAP2 was observed with field B. bovis-infected bovine sera collected from geographically different regions of the world. Moreover, antiserum against rBbTRAP2 specifically reacted with the authentic protein by Western blot analysis and an indirect fluorescent antibody test. Three bands corresponding to 104-, 76-, and 44-kDa proteins were identified in the parasite lysates and two bands of 76- and 44-kDa proteins were detected in the supernatant of cultivated parasites, indicating that BbTRAP2 was proteolytically processed and shed into the culture. Apical and surface localizations of BbTRAP2 were observed in the intracellular and extracellular parasites, respectively, by confocal laser microscopic examination. Moreover, native BbTRAP2 was precipitated by bovine erythrocytes, suggesting its role in the attachment to erythrocytes. Furthermore, the specific antibody to rBbTRAP2 inhibited the growth of B. bovis in a concentration-dependent manner. Consistently, pre-incubation of the free merozoites with the antibody to rBbTRAP2 resulted in an inhibition of the parasite invasion into host erythrocytes. Interestingly, the antibody to rBbTRAP2 was the most inhibitive for the parasite's growth as compared to those of a set of antisera produced against different recombinant proteins, including merozoite surface antigen 2c (BbMSA-2c, rhoptry-associated protein 1 C-terminal (BbRAP-1CT, and spherical body protein 1 (BbSBP-1. These results suggest that BbTRAP2 might be a potential candidate for development of a subunit vaccine against B. bovis infection.

  14. A Mixed Anonymous System based on Tor%基于Tor的混合匿名转发系统

    Institute of Scientific and Technical Information of China (English)

    郑光; 薛质

    2011-01-01

    随着互联网应用的不断增加,人们对网络通信的保密性也越来越重视。Tor匿名通信系统具有低时延、数据加密传输,安全信道等优点,能够有效保护通信者的信息安全,目前正成为一种流行的匿名通信系统。但随着Tor系统使用和研究的人增多,Tor系统本身的一些缺陷给其安全带来了隐患。为此,在现有Tor系统分析的基础上,文中提出了一种安全新型的混合匿名转发系统H—Tor。该系统由Hordes和Tor有效级联组合,充分发挥了两者的优势。分析表明,H—Tor可以抵御通信流攻击和端对端攻击,有效保护通信者的匿名安全。%With the continuous increase of lnternet applications, people pay much attention to the confidentiality of network communications. Tor anonymous communication system, with low latency, data eneryption transmission, secure channel, etc., could effectively protect the information security of the correspondents, and thus becomes a popular anonymous communication system. However, with in-depth study wide use of the Tor system, Tor presents some defects in security risks. Currently, a new system called H-Tor is proposed upon the analysis of Tor. The system combines Hordes with Tor and gives full play to their advantages. Analysis shows that the H-Tor integration can effectively protect the anonymity of the correspondents.

  15. The urine marker test

    DEFF Research Database (Denmark)

    Elbe, Anne-Marie; Jensen, Stine Nylandsted; Elsborg, Peter;

    2016-01-01

    BACKGROUND: Urine sample collection for doping control tests is a key component of the World Anti-Doping Agency's fight against doping in sport. However, a substantial number of athletes experience difficulty when having to urinate under supervision. Furthermore, it cannot always be ensured...... that athletes are actually delivering their own urine. A method that can be used to alleviate the negative impact of a supervised urination procedure and which can also identify urine as coming from a specific athlete is the urine marker test. Monodisperse low molecular weight polyethylene glycols (PEGs......) are given orally prior to urination. Urine samples can be traced to the donor by analysis of the PEGs previously given. OBJECTIVE: The objective of this study was to investigate the use of the urine marker during urine doping control testing. METHODS: Two studies investigated athletes' acceptance...

  16. Lipoprotein marker for hypertriglyceridemia

    Science.gov (United States)

    Cubicciotti, Roger S.; Karu, Alexander E.; Krauss, Ronald M.

    1986-01-01

    Methods and compositions are provided for the detection of a particular low density lipoprotein which has been found to be a marker for patients suffering from type IV hypertriglyceridemia. A monoclonal antibody capable of specifically binding to a characteristic epitopic site on this LDL subspecies can be utilized in a wide variety of immunoassays. Hybridoma cell line SPL.IVA5A1 was deposited at the American Type Culture Collection on Mar. 29, 1984, and granted accession no. HB 8535.

  17. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  18. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  19. Factors associated with failure to return for HIV test results in a free and anonymous screening centre.

    Science.gov (United States)

    Laanani, Moussa; Dozol, Adrien; Meyer, Laurence; David, Stéphane; Camara, Sékou; Segouin, Christophe; Troude, Pénélope

    2015-07-01

    Free and anonymous screening centres (CDAG: Centres de Depistage Anononyme et Gratuit) are public facilities set up for HIV infection diagnosis in France. Some people visiting CDAG fail to return for test results and are not informed of their serology. This study aimed to assess factors associated with failure to return for HIV test results. Patients visiting the Fernand-Widal CDAG (Paris) for an HIV test in January-February 2011 were eligible to take part in the study. Data were collected with an anonymous self-administered questionnaire. Factors associated with failure to return were assessed using logistic regression models. Of the 710 participants (participation rate 88%), 46 patients failed to return. Not specifying birthplace and not living in the region of Paris were associated with failure to return. Those who perceived no risk of HIV infection and those who felt they were more at risk than other people were both statistically associated with failure to return. Self-perceived risk seemed to be of chief concern for failure to return for HIV test results and should be considered during pre-test counselling.

  20. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Institute of Scientific and Technical Information of China (English)

    谢琪; 胡斌; 陈克非; 刘文浩; 谭肖

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency.

  1. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  2. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  3. An Anonymity Attack Model for a Mobile Computing Environment%一种在移动计算环境中的匿名攻击:漠型

    Institute of Scientific and Technical Information of China (English)

    王亮

    2012-01-01

    In a mobile computing environment, anonymity is the property of keeping secret of user's the identity. Currently, many anonymity mechanisms have been proposed, but they seldom concern how to evaluate the security of an anonymity mechanism for a mobile computing environment. This paper proposes a novel conceptual anonymity analysis model based on the fuzzy relation theory in fuzzy mathematics. Theoretic analysis shows that the proposed model can effectively analyze and evaluate the security of anonymity mechanisms in a mobile computing environment.%在移动计算环境中,匿名能够保障用户身份的隐秘性。目前学界提出了很多有关匿名的解决方案,但对如何评估在移动计算环境中匿名机制安全性的研究较少。文章基于模糊关系理论提出了一种新的在移动计算环境中的匿名攻击模型。理论分析表明,该模型能够有效地分析和评估在移动计算环境中匿名机制的安全性。

  4. Nuclear Medicine

    Science.gov (United States)

    ... Parents/Teachers Resource Links for Students Glossary Nuclear Medicine What is nuclear medicine? What are radioactive tracers? ... funded researchers advancing nuclear medicine? What is nuclear medicine? Nuclear medicine is a medical specialty that uses ...

  5. A 2nd generation linkage map of Heterobasidion annosum s.l. based on in silico anchoring of AFLP markers.

    Directory of Open Access Journals (Sweden)

    Mårten Lind

    Full Text Available In this study, we present a 2(nd generation genetic linkage map of a cross between the North American species Heterobasidion irregulare and H. occidentale, based on the alignment of the previously published 1(st generation map to the parental genomes. We anchored 216 of the original 308 AFLP markers to their respective restriction sites using an in silico-approach. The map resolution was improved by adding 146 sequence-tagged microsatellite markers and 39 sequenced gene markers. The new markers confirmed the positions of the anchored AFLP markers, fused the original 39 linkage groups together into 17, and fully expanded 12 of these to single groups covering entire chromosomes. Map coverage of the genome increased from 55.3% to 92.8%, with 96.3% of 430 markers collinearly aligned with the genome sequence. The anchored map also improved the H. irregulare assembly considerably. It identified several errors in scaffold arrangements and assisted in reducing the total number of major scaffolds from 18 to 15. This denser, more comprehensive map allowed sequence-based mapping of three intersterility loci and one mating type locus. This demonstrates the possibility to utilize an in silico procedure to convert anonymous markers into sequence-tagged ones, as well as the power of a sequence-anchored linkage map and its usefulness in the assembly of a whole genome sequence.

  6. 78 FR 41720 - CampCo Petition to Allow Commercial Distribution of Tritium Markers

    Science.gov (United States)

    2013-07-11

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 32 CampCo Petition to Allow Commercial Distribution of Tritium... commercial distribution of tritium markers for use under exemption from licensing requirements. DATES: Submit... allow the commercial distribution of tritium markers for use under exemption from licensing...

  7. SSL VPN中匿名身份认证方案的设计与实现%Design and Implementation of an Anonymous Authentication Scheme in SSL VPN

    Institute of Scientific and Technical Information of China (English)

    项顺伯

    2011-01-01

    Considered the security of authentication for the mobile clients in SSL VPN, an anonymous authentication scheme was proposed. The security and anonymity of the scheme were analyzed. It is showed that the scheme is efficient, the security and anonymity of authentication for the mobile clients in SSL VPN can be ensured.%针对SSL VPN中移动客户端身份认证的安全性问题,提出一种匿名身份认证的方案,并对方案的安全性和匿名性进行了分析.分析表明,该方案有效可行,能保证SSL VPN移动客户端身份认证的匿名性和安全性.

  8. 具有快速ID匿名的移动IP注册协议%Mobile IP Registration Protocol with ID Fast Anonymity

    Institute of Scientific and Technical Information of China (English)

    董博; 王保仓; 魏文佳

    2012-01-01

    In view of the anonymous authentication and certification problems in the mobile IP registration,a mobile IP registration protocol with ID anonymity rapidly is proposed.The security of the protocol is based on the elliptic curve CDH.Temporary IDs varying with each registration guarantee anonymity and intractability of the true ID.%针对移动IP注册过程中的匿名和认证问题,提出一个具有快速ID匿名的移动IP注册协议。该协议安全性是基于椭圆曲线CDH问题,通过构造临时ID保证真实ID的匿名性,每次注册请求中的临时ID都在不断变化,实现了用户ID的匿名性和位置隐蔽性。

  9. Bone Remodelling Markers in Rheumatoid Arthritis

    Directory of Open Access Journals (Sweden)

    Patrice Fardellone

    2014-01-01

    Full Text Available Bone loss in rheumatoid arthritis (RA patients results from chronic inflammation and can lead to osteoporosis and fractures. A few bone remodeling markers have been studied in RA witnessing bone formation (osteocalcin, serum aminoterminal propeptide of type I collagen (PINP, serum carboxyterminal propeptide of type I collagen (ICTP, bone alkaline phosphatase (BAP, osteocalcin (OC, and bone resorption: C-terminal telopeptide of type 1 collagen (I-CTX, N-terminal telopeptide of type 1 collagen (I-NTX, pyridinolines (DPD and PYD, and tartrate-resistant acid phosphatase (TRAP. Bone resorption can be seen either in periarticular bone (demineralization and erosion or in the total skeleton (osteoporosis. Whatever the location, bone resorption results from activation of osteoclasts when the ratio between osteoprotegerin and receptor activator of nuclear factor kappa-B ligand (OPG/RANKL is decreased under influence of various proinflammatory cytokines. Bone remodeling markers also allow physicians to evaluate the effect of drugs used in RA like biologic agents, which reduce inflammation and exert a protecting effect on bone. We will discuss in this review changes in bone markers remodeling in patients with RA treated with biologics.

  10. Study of the impact of radionuclides discharges from nuclear industry in the northern Cotentin area on the oyster Crassostrea gigas: expression of cellular stress molecular markers; Etude de l'impact des radionucleides rejetes par les installations nucleaires du Nord Cotentin sur l'huitre creuse Crassostrea gigas: analyse de l'expression de marqueurs moleculaires de stress

    Energy Technology Data Exchange (ETDEWEB)

    Farcy, E

    2006-11-15

    This thesis explores the potential radiological impact of radionuclide discharges from the nuclear industry on the Pacific oyster, Crassostrea gigas. One of the major goals of this research was to identify markers that could be used to monitor the effects of low-level chronic irradiation. We decided to focalize on the expression of stress-induced genes involved in the regulation of cellular stress, focusing on transcription. First, homology cloning was used to identify four new cDNAs encoding stress markers. Then data collected at various sites enabled to evidence that mRNA levels for each of the genes of interest naturally vary to a significant degree, based on individual differences and seasonal factors. Comparing oysters from exposed sites with those from a reference site located on the Atlantic coast did not suggest any relationship between mRNA levels changes and the oysters exposure to liquid radioactive waste from the A.R.E.V.A. reprocessing plant. In the environment, we found that those radionuclide releases resulted in a very small increase in radioactivity in oysters, especially compared with their natural radioactivity. In the laboratory, by exposing the oysters to higher radionuclide concentrations than those found in the environment, we were able to identify two genes as potential candidates for studying the effects of chronic exposure to low doses of ionizing radiations in the oyster: genes encoding MT and MXR. We confirmed that transcriptional induction of these two genes occurs in response to high doses of acute irradiation. Finally, the comparison between environmental results and the laboratory results underlined the complementarity of these two approaches. In particular, it revealed that seasonal variations in mRNA levels probably have a significant effect on the stress response. (author)

  11. Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014

    Directory of Open Access Journals (Sweden)

    Traian Marius Truta

    2015-04-01

    Full Text Available The seventh Workshop on Privacy and Anonymity in Information Society (PAIS 2014 was held in conjunction with the International Conference on Extending Database Technology (EDBT and International Conference on Database Theory (ICDT in Athens, Greece. The PAIS 2014 workshop provided an open yet focused platform for researchers and practitioners from fields such as computer science, statistics, healthcare informatics, and law to discuss and present current research challenges and advances in data privacy and anonymity research. The present special issue contains three extended papers that have been selected as the best three papers presented at PAIS 2014 workshop.

  12. Cancer and tumour markers

    International Nuclear Information System (INIS)

    Cancer has been a major cause of death world wide and in Nigeria there are six commonest forms of manifestation of cancer known. Of these prostrate cancer is the highest with 16% occurrence of all known cancers according to a study by the Histopathology Department of the UCH. Many factors, amongst them dietary, environmental, lifestyle, age and sedentary work are possible causes. With the global rise in incidents, the IAEA initiated the Tumour Marker Project as a means of screening cancers in 15 African countries including Nigeria. In Nigeria, 4 groups of the commonest cancers have been chosen for screening. These are prostrate cancer, primary liver cancer, cancer of the GI tract and trophoblastic cancer

  13. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor

    Science.gov (United States)

    Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin

    Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser changes, its security requirements also change. In this work, we present the use of authorisation policies to automatise the process of controlling the resources of a Web browser when its context changes. The objective of our proposal is oriented towards easing the adaptation to the security requirements of the new context and enforce them in the browser without the need for user intervention. We present a concrete application of our work as a plug-in for the adaption of security requirements in Mozilla/Firefox browser when a context of anonymous navigation through the Tor network is enabled.

  14. Anonymous Communication Method of MANET's Trusted Routing%MANET中的可信路由匿名通信方法

    Institute of Scientific and Technical Information of China (English)

    徐劢; 王剑

    2014-01-01

    Nowadays,MANET is widely used in military,disaster relief,small meetings and so on. Since MANET has high node mob-ility and quick changes of network topology,the secure routing algorithm applied in normal wireless networks couldn't fairly solve the security problems of MANET's routing,and thus MANET's secure routing algorithm becomes a research hotspot. In actual demand,MA-NET routing algorithms are often reqired to meet strong security,quick links and anonymous communication,and however the current studies merely focus on security concerns. In combination of trusted computing,a novel secure routing algorithm TAAODV( Trusted A-nonymous AODV) is proposed. Based on AODV(ad-hoc on-demand distance vector routing) algorithm,this proposed algorithm in-corporates trusted computing and realizes anonymous communication,and by introducing zero-knowledge proof and ring signature into node certification,requires no online TA. Simulation indicates that this algorithm can resist most known attack methods,and compared with AODV,it could satisfy the demands of fast connections without much additional cost of resources.%目前,MANET已经广泛应用于军事、抢险救灾、小型会议等用途。由于MAENT其节点移动性高、网络拓扑变化快等特点,一般应用于无线网络中的安全路由算法并不能很好地解决其路由安全的问题,故其安全路由算法一直是研究的热点。在实际需求中,MANET安全路由算法往往需要满足强安全性、快速链接、匿名通信等要求,而现今的大多数研究更仅侧重于安全性方面的讨论。文中结合可信计算的内容,提出了一种新颖的安全路由算法TAAODV( Trusted Anonymous AODV)。该算法基于AODV( ad-hoc on-demand distance vector routing)算法,引入可信计算,使用伪名来进行匿名通信,在节点间的认证环节引入零知识证明、环签名等方法,并且不需要在线的可信第三方。经过仿真验证,该算法可

  15. Exon-primed intron-crossing (EPIC markers as a tool for ant phylogeography

    Directory of Open Access Journals (Sweden)

    Patrícia R. Ströher

    2013-12-01

    Full Text Available Exon-primed intron-crossing (EPIC markers as a tool for ant phylogeography. Due to their local abundance, diversity of adaptations and worldwide distribution, ants are a classic example of adaptive radiation. Despite this evolutionary and ecological importance, phylogeographical studies on ants have relied largely on mitochondrial markers. In this study we design and test exon-primed intron-crossing (EPIC markers, which can be widely used to uncover ant intraspecific variation. Candidate markers were obtained through screening the available ant genomes for unlinked conserved exonic regions interspersed with introns. A subset of 15 markers was tested in vitro and showed successful amplification in several phylogenetically distant ant species. These markers represent an important step forward in ant phylogeography and population genetics, allowing for more extensive characterization of variation in ant nuclear DNA without the need to develop species-specific markers.

  16. POPULAR MOLECULAR MARKERS IN BACTERIA

    OpenAIRE

    Weilong, Liu; Lv, Li; MD. ASADUZZAMAN KHAN AND FEIZHOU ZHU

    2012-01-01

    Molecular markers are defined as the fragments of DNA sequence associated with a genome, which are used to identify a particular DNA sequence. Nowadays, with the explosive growth of genetic research and bacterial classification, molecular marker is an important tool to identify bacterial species. Taking account to its significant roles in clinic, medicine and food industry, in this review article, we summarize the traditional research and new development about molecular markers (also called g...

  17. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes. PMID:25677956

  18. Duke Surgery Patient Safety: an open-source application for anonymous reporting of adverse and near-miss surgical events

    Directory of Open Access Journals (Sweden)

    McCready Mariana

    2007-05-01

    Full Text Available Abstract Background Studies have shown that 4% of hospitalized patients suffer from an adverse event caused by the medical treatment administered. Some institutions have created systems to encourage medical workers to report these adverse events. However, these systems often prove to be inadequate and/or ineffective for reviewing the data collected and improving the outcomes in patient safety. Objective To describe the Web-application Duke Surgery Patient Safety, designed for the anonymous reporting of adverse and near-miss events as well as scheduled reporting to surgeons and hospital administration. Software architecture DSPS was developed primarily using Java language running on a Tomcat server and with MySQL database as its backend. Results Formal and field usability tests were used to aid in development of DSPS. Extensive experience with DSPS at our institution indicate that DSPS is easy to learn and use, has good speed, provides needed functionality, and is well received by both adverse-event reporters and administrators. Discussion This is the first description of an open-source application for reporting patient safety, which allows the distribution of the application to other institutions in addition for its ability to adapt to the needs of different departments. DSPS provides a mechanism for anonymous reporting of adverse events and helps to administer Patient Safety initiatives. Conclusion The modifiable framework of DSPS allows adherence to evolving national data standards. The open-source design of DSPS permits surgical departments with existing reporting mechanisms to integrate them with DSPS. The DSPS application is distributed under the GNU General Public License.

  19. Biochemical markers of bone turnover

    International Nuclear Information System (INIS)

    Biochemical markers of bone turnover has received increasing attention over the past few years, because of the need for sensitivity and specific tool in the clinical investigation of osteoporosis. Bone markers should be unique to bone, reflect changes of bone less, and should be correlated with radiocalcium kinetics, histomorphometry, or changes in bone mass. The markers also should be useful in monitoring treatment efficacy. Although no bone marker has been established to meet all these criteria, currently osteocalcin and pyridinium crosslinks are the most efficient markers to assess the level of bone turnover in the menopausal and senile osteoporosis. Recently, N-terminal telopeptide (NTX), C-terminal telopeptide (CTX) and bone specific alkaline phosphatase are considered as new valid markers of bone turnover. Recent data suggest that CTX and free deoxypyridinoline could predict the subsequent risk of hip fracture of elderly women. Treatment of postmenopausal women with estrogen, calcitonin and bisphosphonates demonstrated rapid decrease of the levels of bone markers that correlated with the long-term increase of bone mass. Factors such as circadian rhythms, diet, age, sex, bone mass and renal function affect the results of biochemical markers and should be appropriately adjusted whenever possible. Each biochemical markers of bone turnover may have its own specific advantages and limitations. Recent advances in research will provide more sensitive and specific assays

  20. The prognostic molecular markers in hepatocellular carcinoma

    Institute of Scientific and Technical Information of China (English)

    Lun-Xiu Qin; Zhao-You Tang

    2002-01-01

    The prognosis of hepatocellular carcinoma (HCC) stillremains dismal, although many advances in its clinicalstudy have been made. It is important for tumor control toidentity the factors that predispose patients to death. Withnew discoveries in cancer biology, the pathological andbiological prognostic factors of HCC have been studied quiteextensively. Analyzing molecular markers (biomarkers) withprognostic significance is a complementary method. A largenumber of molecular factors have been shown to associatewith the invasiveness of HCC, and have potential prognosticsignificance. One important aspect is the analysis ofmolecular markers for the cellular malignancy phenotypeThese include alterations in DNA ploidy, cellularproliferation markers (PCNA, Ki-67, Mcm2, MIB1, MIA, andCSE1L/CAS protein), nuclear morphology, the p53 geneand its related molecule MDM2, other cell cycle regulators(cyclin A, cyclin D, cyclin E, cdc2, p27, p73), oncogenesand their receptors (such as ras, c-myc, c-fms, HGF, c-met, and erb-B receptor family members ), apoptosisrelated factors (Fas and FasL), as well as telomeraseactivity. Another important aspect is the analysis ofmolecular markers involved in the process of cancerinvasion and metastasis. Adhesion molecules (E-cadherin,catenins, serum intercellular adhesion molecule-1, CD44variants), proteinases involved in the clegradation ofextracellular matrix (MMP-2, MMP-9, uPA, uPAR, PAl), aswell as other molecules have been regarded as biomarkersfor the malignant phenotype of HCC, and are related toprognosis and therapeutic outcomes. Tumor angiogenesisis critical to both the growth and metastasis of cancersincluding HCC, and has drawn much attention in recentyears. Many angiogenesis-related markers, such as vascularendothelial growth factor (VEGF), basic fibroblast growthfactor (bFGF), platelet-derived endothelial cell growth factor( PD-ECGF ), thrombospondin ( TSP ), angiogenin,pleiotrophin, and endostatin (ES) levels, as well asinratumor

  1. Research on the status of acceptance of Fukushima nuclear power accidents and the understanding of knowledge for college students

    International Nuclear Information System (INIS)

    Objective To investigate the connection between the understanding of basic knowledge of nuclear power and whether to accept the changes in attitude with Fukushima nuclear accidents for college students who were education in public. Methods 3000 questionnaires were distributed for college students by anonymity before and after the accident in the Fukushima nuclear power plant, respectively. Results the results of investigation showed that Fukushima nuclear accidents have influenced on the mental of college students, there significant differences between the two investigations. Conclusion college students have a little knowledge of nuclear power, it is necessary to strengthen publicity and education efforts for college students. (authors)

  2. DIAGNOSTIC IMPLICATIONS OF IMMUNOHISTOCHEMICAL MARKERS IN UTERINE SMOOTH MUSCLE TUMORS

    Institute of Scientific and Technical Information of China (English)

    朱雪琼; 石一复; 陈晓端; 吴裕中

    2004-01-01

    Objective: To evaluate the diagnostic implications of immunohistochemical markers in uterine smooth muscle tumors. Methods: Formalin-fixed paraffin-embedded tissue blocks were selected from 17 uterine leiomyosarcomas, 40 uterine unusual leiomyomas and 25 uterine usual leiomyomas. Utilizing immunohistochemical techniques with antigen retrieval, serial sections of each tumor for immunoreactivity with myogenic markers, ovarian steroid receptors, CD44v3, proliferating cell nuclear antigen and mast cells were assessed. Results: Although the myogenic markers and CD44v3 showed less frequent positivity in uterine leiomyosarcomas than those in unusual leiomyomas, they were not reliable markers for differentiating leiomyosarcoma from leiomyoma. Uterine leiomyosarcoma tended to have lower ovarian steroid receptors immunoreactivity rates than leiomyoma. Leiomyoma tended to have a higher quantity of intratumoral mast cells than leiomyosarcoma, while the expression of proliferating cell nuclear antigen was lower in them. Conclusion: Because the estimation of mitotic count was subject to significant variation, the immunohistochemical expression of ovarian steroid receptors, mast cells and proliferating cell nuclear antigen seemed to be helpful for the discrimination of unusual leiomyoma from leiomyosarcoma.

  3. 大叶藻居群微卫星遗传多样性研究%GENETIC DIVERSITY IN POPULATIONS OF ZOSTER MARINA L.INFERRED FROM NUCLEAR SSR MARKERS

    Institute of Scientific and Technical Information of China (English)

    孙典荣; 李渊; 李文涛; 高天翔

    2013-01-01

    Seagrasses are angiosperms that are thought to have become adaptive to aquatic environment independently. The marine, monocotyledonous Zostera marina is a species of Zosteraceae using traditional classifications, which widely distributes from subtropical to subfrigid coastal oceans. Seven natural populations of Z. marina (Lidao, Tian'ehu, Qingdao Bay, Dalian, Naepo, Tokyo Bay and Finavarra) were used in this study. To study the mechanism of the genetic diversity and population structure of the seven populations, microsatellite marker (SSR) analysis was done. A total of 57 alleles were identified in 148 individuals across the four microsatellite primers analyzed, with a mean value of 6 alleles per locus. The mean expected heterozygosity (He) and observed heterozygosity (Ho) across all populations were 0.687 and 0.417, respectively, and a higher level of diversity was found in the population from the Qingdao Bay (A=l.750, AR=1.043) than other populations. The minimum Fst value was 0.051 between the populations from the Qingdao Bay and Dalian. The maximum Fsl value was 0.261 between the populations from Tian'ehu and Finavarra. The Fsl values suggested moderate genetic differentiation within most of the Z. marina populations. From the UPGMA tree, four populations in China (Lidao, Tian'ehu, Qingdao Bay and Dalian) clustered together, and the genetic relationships may be attributed to eelgrass meadow fragmentation. The geographic distance was responsible for the genetic differentiation from large-scale among populations in China (Lidao, Tian'ehu, Qingdao Bay and Dalian), Korea (Naepo), Japan (Tokyo Bay) and Ireland (Finavarra). Results of possible number of clusters supported that this seagrass species originated from East Asia. The population from the Qingdao Bay has higher genetic diversity, suggesting that populations in this region demand prioritized conservation and utilization for breeding programs.%采用4对微卫星引物对大叶藻的7个地理居群进行了

  4. Genetic variation in two conserved local Romanian pig breeds using type 1 DNA markers

    Directory of Open Access Journals (Sweden)

    Wales Richard

    2001-07-01

    Full Text Available Abstract Analysis of the genetic variation of an endangered population is an important component for the success of conservation. Animals from two local Romanian pig breeds, the Mangalitsa and Bazna, were analysed for variation at a number of genetic loci using PCR-based DNA tests. Polymorphism was assessed at loci which 1 are known to cause phenotypic variation, 2 are potentially involved in trait differences or 3 are putative candidate genes. The traits considered are disease resistance, growth, coat colour, meat quality and prolificacy. Even though the populations are small and the markers are limited to specific genes, we found significant differences in five of the ten characterised loci. In some cases the observed allele frequencies were interesting in relation to gene function and the phenotype of the breed. These breeds are part of a conservation programme in Romania and marker information may be useful in preserving a representative gene pool in the populations. The use of polymorphisms in type 1 (gene markers may be a useful complement to analysis based on anonymous markers.

  5. Nuclear Confidence

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The Fukushima nuclear accident provides valuable lessons for China national nuclear Corp.as it continues to expand its operations AS Japan’s Fukushima nuclear crisis sparks a global debate over nuclear safety,China National Nuclear Corp. (CNNC),the country’s largest nuclear plant operator, comes under the spotlight.

  6. The Impact of Counselor Recovery Status Similarity on Perceptions of Attractiveness with Members of Alcoholics Anonymous: An Exception to the Repulsion Hypothesis

    Science.gov (United States)

    Priester, Paul E.; Azen, Razia; Speight, Suzette; Vera, Elizabeth M.

    2007-01-01

    This study explores the impact of counselor alcoholism recovery status on perceptions of recovering alcoholics who are active members of Alcoholics Anonymous. The participants (n = 116) were given a description of an analogue counselor and rated this counselor using the "Counselor Rating Form-Short." There were three forms of the analogue…

  7. Becoming a morther by non-anonymous egg donation: secrecy and the relationship between egg recipient, egg donor and egg donation child

    NARCIS (Netherlands)

    Berkel, D.A.M. van; Candido, A.; Pijffers, W.H.

    2007-01-01

    The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through eg

  8. A Comparison of Anonymous versus Identifiable e-Peer Review on College Student Writing Performance and the Extent of Critical Feedback

    Science.gov (United States)

    Lu, Ruiling; Bol, Linda

    2007-01-01

    Peer review has become commonplace in composition courses and is increasingly employed in the context of telecommunication technology. The purpose of this experiment was to compare the effects of anonymous and identifiable electronic peer (e-peer) review on college student writing performance and the extent of critical peer feedback. Participants…

  9. Markers of renal function tests

    Directory of Open Access Journals (Sweden)

    Shivaraj Gowda

    2010-04-01

    Full Text Available Background: The markers of renal function test assess the normal functioning of kidneys. These markers may be radioactive and non radioactive. They indicate the glomerular filtration rate, concentrating and diluting capacity of kidneys (tubular function. If there is an increase or decrease in the valves of these markers it indicates dysfunction of kidney. Aim: The aim of this review is to compare and analyze the present and newer markers of renal function tests which help in diagnosis of clinical disorders. Material & Methods: An extensive literature survey was done aiming to compare and compile renal function tests makers required in diagnosis of diseases. Results: Creatinine, urea, uric acid and electrolytes are makers for routine analysis whereas several studies have confirmed and consolidated the usefulness of markers such as cystatin C and β-Trace Protein. Conclusion: We conclude that further investigation is necessary to define these biomarkers in terms of usefulness in assessing renal function.

  10. Nuclear power and nuclear weapons

    International Nuclear Information System (INIS)

    The proliferation of nuclear weapons and the expanded use of nuclear energy for the production of electricity and other peaceful uses are compared. The difference in technologies associated with nuclear weapons and nuclear power plants are described

  11. Anonymization of big data based on hybrid tree%基于混合式子树算法的大数据匿名化

    Institute of Scientific and Technical Information of China (English)

    孙炯宁

    2015-01-01

    The top-down specialization( TDS) and the bottom-up generalization( BUG) are two ways to fulfill the sub-tree anonymization. However,existing approaches for sub-tree anonymization fall short of parallelization capability,thereby lacking scalability in handling big data on cloud. Still,both the TDS and the BUG suffer from poor performances for certain value of the K anonymity parameter when they are utilized individually. In view of that,a hybrid approach combining the TDS and the BUG for efficient sub-tree anonymization over big data is proposed. Further,the MapReduce is designed based algorithms for two components ( TDS and BUG ) to gain the high scalability by exploiting powerful computation capability of cloud. Experiment evaluations demonstrate that the hybrid approach significantly improves the scalability and the efficiency of the sub-tree anonymization scheme over existing approaches.%自顶而下具体化( TDS)和自底向上泛化( BUG)是子树匿名化的主要方法,但其并行能力不足,易导致在云数据处理中缺乏可扩展性。当TDS和BUG分开使用时,很难准确确定K匿名参数。针对这一问题,该文提出一种在大数据中进行有效数据匿名化的基于TDS和BUG的混合方法,设计了基于该混合方法的MapReduce模型,以提高云计算能力的可扩展性。实验表明,与现有方法相比,该混合法可以显著提高扩展性和子树匿名化的效率。

  12. MarkerSet: a marker selection tool based on markers location and informativity in experimental designs

    Directory of Open Access Journals (Sweden)

    Demeure Olivier

    2008-03-01

    Full Text Available Abstract Background The recent sequencing of full genomes has led to the availability of many SNP markers which are very useful for the mapping of complex traits. In livestock production, there are still no commercial arrays and many studies use home-made sets of SNPs. Thus, the current methodologies for SNP genotyping are still expensive and it is a crucial step to select the SNPs to use. Indeed, the main factors affecting the power of the linkage analyses are the density of the genetic map and the heterozygosity of markers in tested animal parents. Findings This is why we have developed a PERL program selecting a defined number of markers based on their locations on the genome and their informativity in specific experimental designs. As an option, different experimental designs can be combined in order to select the best possible common marker set. The program has been tested using different conditions of marker informativity and density with both real and simulated datasets. The results show the efficiency of our program to select the most informative markers even if there is a wide range of informativity for whole genome scan mapping analyses. In case of combination of different experimental crosses, the multidesign mode can optimize the SNP markers selection. Conclusion Written in PERL, it assures a maximum portability to other operating systems (OS and the source code availability for user modifications. Except for the simulation mode which could be time consuming, MarkerSet can compute results in a very short time.

  13. Simple parametric survival analysis with anonymized register data: A cohort study with truncated and interval censored event and censoring times

    Directory of Open Access Journals (Sweden)

    Kristiansen Ivar S

    2011-08-01

    Full Text Available Abstract Background To preserve patient anonymity, health register data may be provided as binned data only. Here we consider as example, how to estimate mean survival time after a diagnosis of metastatic colorectal cancer from Norwegian register data on time to death or censoring binned into 30 day intervals. All events occurring in the first three months (90 days after diagnosis were removed to achieve comparability with a clinical trial. The aim of the paper is to develop and implement a simple, and yet flexible method for analyzing such interval censored and truncated data. Methods Considering interval censoring a missing data problem, we implement a simple multiple imputation strategy that allows flexible sensitivity analyses with respect to the shape of the censoring distribution. To allow identification of appropriate parametric models, a χ2-goodness-of-fit test--also imputation based--is derived and supplemented with diagnostic plots. Uncertainty estimates for mean survival times are obtained via a simulation strategy. The validity and statistical efficiency of the proposed method for varying interval lengths is investigated in a simulation study and compared with simpler alternatives. Results Mean survival times estimated from the register data ranged from 1.2 (SE = 0.09 to 3.2 (0.31 years depending on period of diagnosis and choice of parametric model. The shape of the censoring distribution within intervals did generally not influence results, whereas the choice of parametric model did, even when different models fit the data equally well. In simulation studies both simple midpoint imputation and multiple imputation yielded nearly unbiased analyses (relative biases of -0.6% to 9.4% and confidence intervals with near-nominal coverage probabilities (93.4% to 95.7% for censoring intervals shorter than six months. For 12 month censoring intervals, multiple imputation provided better protection against bias, and coverage probabilities

  14. Nuclear moments

    CERN Document Server

    Kopferman, H; Massey, H S W

    1958-01-01

    Nuclear Moments focuses on the processes, methodologies, reactions, and transformations of molecules and atoms, including magnetic resonance and nuclear moments. The book first offers information on nuclear moments in free atoms and molecules, including theoretical foundations of hyperfine structure, isotope shift, spectra of diatomic molecules, and vector model of molecules. The manuscript then takes a look at nuclear moments in liquids and crystals. Discussions focus on nuclear paramagnetic and magnetic resonance and nuclear quadrupole resonance. The text discusses nuclear moments and nucl

  15. Nuclear safeguards; Salvaguardias nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Zurron, O.

    2015-07-01

    Safeguards control at the Juzbado Plant is implemented through the joint IAEA/EURATOM partnership approach in force within the European Union for all nuclear facilities. this verification agreement is designed to minimize burden on the operators whilst ensuring that both inspectorate achieve the objectives related to their respective safeguards regimes. This paper outlines the safeguards approaches followed by the inspectorate and the particularities of the Juzbado Plants nuclear material accountancy and control system. (Authors)

  16. Mammographic density and epithelial histopathologic markers

    International Nuclear Information System (INIS)

    We explored the association of mammographic density, a breast cancer risk factor, with hormonal and proliferation markers in benign tissue from tumor blocks of pre-and postmenopausal breast cancer cases. Breast cancer cases were recruited from a case-control study on breast density. Mammographic density was assessed on digitized prediagnostic mammograms using a computer-assisted method. For 279 participants of the original study, we obtained tumor blocks and prepared tissue microarrays (TMA), but benign tissue cores were only available for 159 women. The TMAs were immunostained for estrogen receptor alpha (ERα) and beta (ERβ), progesterone receptor (PR), HER2/neu, Ki-67, and Proliferating Cell Nuclear Antigen (PCNA). We applied general linear models to compute breast density according to marker expression. A substantial proportion of the samples were in the low or no staining categories. None of the results was statistically significant, but women with PR and ERβ staining had 3.4% and 2.4% higher percent density. The respective values for Caucasians were 5.7% and 11.6% but less in Japanese women (3.5% and -1.1%). Percent density was 3.4% higher in women with any Ki-67 staining and 2.2% in those with positive PCNA staining. This study detected little evidence for an association between mammographic density and expression of steroid receptors and proliferation markers in breast tissue, but it illustrated the problems of locating tumor blocks and benign breast tissue samples for epidemiologic research. Given the suggestive findings, future studies examining estrogen effects in tissue, cell proliferation, and density in the breast may be informative

  17. [Tumor markers for hepatocellular carcinoma].

    Science.gov (United States)

    Tateishi, Ryosuke; Enooku, Kenichiro; Shiina, Shuichiro; Koike, Kazuhiko

    2012-05-01

    Three tumor markers for hepatocellular carcinoma (HCC) are available in Japan: alpha-fetoprotein (AFP), protein induced by vitamin K absence or antagonists-II (PIVKA-II), and Lens culinaris agglutinin-reactive fraction of alpha-fetoprotein (AFP-L3). Although AFP has drawbacks in its specificity, it is widely utilized in treatment evaluation and prognosis prediction. PIVKA-II is a unique marker that does not correlate with AFP value and can predict microvascular invasion. AFP-L3 is a highly specific marker and strong predictor of poor prognosis. These three markers are indispensable in every aspect of clinical practice of hepatocellular carcinoma including surveillance, diagnosis, treatment evaluation, and prognosis prediction.

  18. Prenatal Screening Using Maternal Markers

    Directory of Open Access Journals (Sweden)

    Howard Cuckle

    2014-05-01

    Full Text Available Maternal markers are widely used to screen for fetal neural tube defects (NTDs, chromosomal abnormalities and cardiac defects. Some are beginning to broaden prenatal screening to include pregnancy complications such as pre-eclampsia. The methods initially developed for NTDs using a single marker have since been built upon to develop high performance multi-maker tests for chromosomal abnormalities. Although cell-free DNA testing is still too expensive to be considered for routine application in public health settings, it can be cost-effective when used in combination with existing multi-maker marker tests. The established screening methods can be readily applied in the first trimester to identify pregnancies at high risk of pre-eclampsia and offer prevention though aspirin treatment. Prenatal screening for fragile X syndrome might be adopted more widely if the test was to be framed as a form of maternal marker screening.

  19. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  20. The limits of evidence: evidence based policy and the removal of gamete donor anonymity in the UK.

    Science.gov (United States)

    Frith, Lucy

    2015-03-01

    This paper will critically examine the use of evidence in creating policy in the area of reproductive technologies. The use of evidence in health care and policy is not a new phenomenon. However, codified strategies for evidence appraisal in health care technology assessments and attempts to create evidence based policy initiatives suggest that the way evidence is used in practice and policy has changed. This paper will examine this trend by considering what is counted as 'good' evidence, difficulties in translating evidence into policy and practice and how evidence interacts with principles. To illustrate these points the removal of gamete donor anonymity in the UK in 2005 and the debates that preceded this change in the law will be examined. It will be argued that evidence will only ever take us so far and attention should also be paid to the underlying principles that guide policy. The paper will conclude with suggestions for how underlying principles can be more rigorously used in policy formation. PMID:25743050

  1. 基于 DAA 和 TLS 的匿名远程证明协议%Anonymous remote attestation protocol based on DAA and TLS

    Institute of Scientific and Technical Information of China (English)

    张大伟; 韩臻; 蒋逸尘; 黎妹红

    2014-01-01

    To prevent the masquerading attack in the remote attestation with the direct anonymous at-testation (DAA ) ,a anonymous remote attestation protocol was proposed based on DAA and the transport layer security (TLS) protocol .The trusted platform module was utilized to measure the platform configuration and anonymous identity ,and the signature generated .The new identity au-thentication and certificate verification method were designed .The remote attestation information was transmitted with supplemental messages in TLS .The anonymous attestation ,integrity reporting and key agreement mechanisms were integrated so as to build a trusted anonymous channel .Security anal-ysis show s that our protocol satisfies unforgeability ,anonymity ,user-controllable linkability and un-cloneability in identity authentication as well as resists the replay attack and the masquerading attack . The proposed protocol is easily deployed because of the compatibility with the TLS extension frame-work .%为了解决使用直接匿名证明方法进行远程证明易受伪装攻击的问题,提出了一种基于直接匿名证明和安全传输层协议(TLS)的匿名远程证明协议。使用可信平台模块,完成平台配置和匿名身份的度量并生成签名信息;改进身份认证和证书校验机制,并使用T LS协议的扩展消息传输远程证明内容;结合匿名证明、完整性报告和密钥协商机制设计总体协议,从而在交互双方构建出匿名认证的可信信道。分析表明:改进方案满足身份认证的不可伪造性、匿名性、可控的可链接性和不可克隆性,能够抵御重放攻击和伪装攻击,且设计的协议兼容扩展的T LS协议架构,便于部署。

  2. Serum Markers of Intrahepatic Cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Giulia Malaguarnera

    2013-01-01

    Full Text Available Cholangiocarcinoma (CCA is a relatively rare type of primary liver cancer that originates in the bile duct epithelium. It is an aggressive malignancy typified by unresponsiveness to chemotherapy and radiotherapy. Despite advances in radiologic techniques and laboratory diagnostic test, the diagnosis of CCA remains highly challenging. Development in molecular techniques has led to go into the possible use of serum markers in diagnosing of cholangiocarcinoma. This review summarizes the principal characteristics of serum markers of cholangiocarcinoma. The tumour markers used frequently such as Carbohydrate antigen 19-9 (CA 19-9, Carcinogenic Embryonic antigen (CEA, and Cancer Antigen 125 have shown sufficient sensitivity and specificity to detect and monitor CCA. In particular, the combination of these tumour markers seems to increase their efficiency in diagnosing of cholangiocarcinoma. New markers such as Soluble fragment of cytokeratin 19 (CYFRA 21-1 Mucins, Tumour Markers2- pyruvate-Kinase (TuM2- PK and metalloproteinase-7 (MMP-7 have been recently shown to help in the diagnosis of CCA, with in some cases a prognostic value.

  3. Nuclear ventriculography

    Science.gov (United States)

    ... ventriculography (RNV); Multiple gate acquisition scan (MUGA); Nuclear cardiology; Cardiomyopathy - nuclear ventriculography ... 56. Udelson JE, Dilsizian V, Bonow RO. Nuclear cardiology. In: Bonow RO, Mann DL, Zipes DP, Libby ...

  4. Nuclear power

    OpenAIRE

    Waller, David; McDonald, Alan; Greenwald, Judith; Mobbs, Paul

    2005-01-01

    David Waller and Alan McDonald ask whether a nuclear renaissance can be predicted; Judith M. Greenwald discusses keeping the nuclear power option open; Paul Mobbs considers the availability of uranium and the future of nuclear energy.

  5. Nuclear electronics

    International Nuclear Information System (INIS)

    A short survey is given on nuclear radiation detectors and nuclear electronics. It is written for newcomers and those, who are not very familiar with this technique. Some additional information is given on typical failures in nuclear measurement systems. (orig.)

  6. MarkerMiner 1.0: A new application for phylogenetic marker development using angiosperm transcriptomes 1

    OpenAIRE

    Chamala, Srikar; García, Nicolás; Godden, Grant T.; Krishnakumar, Vivek; Jordon-Thaden, Ingrid E.; De Smet, Riet; Berbazuk, W Brad; Douglas E Soltis; Soltis, Pamela S

    2015-01-01

    Premise of the study: Targeted sequencing using next-generation sequencing (NGS) platforms offers enormous potential for plant systematics by enabling economical acquisition of multilocus data sets that can resolve difficult phylogenetic problems. However, because discovery of single-copy nuclear (SCN) loci from NGS data requires both bioinformatics skills and access to high-performance computing resources, the application of NGS data has been limited. Methods and Results: We developed Marker...

  7. Nuclear power

    International Nuclear Information System (INIS)

    The subject is covered in chapters entitled: nuclear power certainties and doubts; nuclear power in the Western World to 2000; the frequency of core meltdown accidents; hidden costs of the accident at Three Mile Island; costs of nuclear accidents - implications for reactor choice; defining the risks of nuclear power; the uncertain economics of a nuclear power program; the economics of enabling decisions (Sizewell B as an enabling decision); trade in nuclear electricity; some pointers to the future. (U.K.)

  8. Biochemical Markers of Myocardial Damage.

    Science.gov (United States)

    Bodor, Geza S

    2016-04-01

    Heart diseases, especially coronary artery diseases (CAD), are the leading causes of morbidity and mortality in developed countries. Effective therapy is available to ensure patient survival and to prevent long term sequelae after an acute ischemic event caused by CAD, but appropriate therapy requires rapid and accurate diagnosis. Research into the pathology of CAD have demonstrated the usefulness of measuring concentrations of chemicals released from the injured cardiac muscle can aid the diagnosis of diseases caused by myocardial ischemia. Since the mid-1950s successively better biochemical markers have been described in research publications and applied for the clinical diagnosis of acute ischemic myocardial injury. Aspartate aminotransferase of the 1950s was replaced by other cytosolic enzymes such as lactate dehydrogenase, creatine kinase and their isoenzymes that exhibited better cardiac specificity. With the availability of immunoassays, other muscle proteins, that had no enzymatic activity, were also added to the diagnostic arsenal but their limited tissue specificity and sensitivity lead to suboptimal diagnostic performance. After the discovery that cardiac troponins I and T have the desired specificity, they have replaced the cytosolic enzymes in the role of diagnosing myocardial ischemia and infarction. The use of the troponins provided new knowledge that led to revision and redefinition of ischemic myocardial injury as well as the introduction of biochemicals for estimation of the probability of future ischemic myocardial events. These markers, known as cardiac risk markers, evolved from the diagnostic markers such as CK-MB or troponins, but markers of inflammation also belong to these groups of diagnostic chemicals. This review article presents a brief summary of the most significant developments in the field of biochemical markers of cardiac injury and summarizes the most recent significant recommendations regarding the use of the cardiac markers in

  9. Imaging markers for Alzheimer disease

    Science.gov (United States)

    Bocchetta, Martina; Chételat, Gael; Rabinovici, Gil D.; de Leon, Mony J.; Kaye, Jeffrey; Reiman, Eric M.; Scheltens, Philip; Barkhof, Frederik; Black, Sandra E.; Brooks, David J.; Carrillo, Maria C.; Fox, Nick C.; Herholz, Karl; Nordberg, Agneta; Jack, Clifford R.; Jagust, William J.; Johnson, Keith A.; Rowe, Christopher C.; Sperling, Reisa A.; Thies, William; Wahlund, Lars-Olof; Weiner, Michael W.; Pasqualetti, Patrizio; DeCarli, Charles

    2013-01-01

    Revised diagnostic criteria for Alzheimer disease (AD) acknowledge a key role of imaging biomarkers for early diagnosis. Diagnostic accuracy depends on which marker (i.e., amyloid imaging, 18F-fluorodeoxyglucose [FDG]-PET, SPECT, MRI) as well as how it is measured (“metric”: visual, manual, semiautomated, or automated segmentation/computation). We evaluated diagnostic accuracy of marker vs metric in separating AD from healthy and prognostic accuracy to predict progression in mild cognitive impairment. The outcome measure was positive (negative) likelihood ratio, LR+ (LR−), defined as the ratio between the probability of positive (negative) test outcome in patients and the probability of positive (negative) test outcome in healthy controls. Diagnostic LR+ of markers was between 4.4 and 9.4 and LR− between 0.25 and 0.08, whereas prognostic LR+ and LR− were between 1.7 and 7.5, and 0.50 and 0.11, respectively. Within metrics, LRs varied up to 100-fold: LR+ from approximately 1 to 100; LR− from approximately 1.00 to 0.01. Markers accounted for 11% and 18% of diagnostic and prognostic variance of LR+ and 16% and 24% of LR−. Across all markers, metrics accounted for an equal or larger amount of variance than markers: 13% and 62% of diagnostic and prognostic variance of LR+, and 29% and 18% of LR−. Within markers, the largest proportion of diagnostic LR+ and LR− variability was within 18F-FDG-PET and MRI metrics, respectively. Diagnostic and prognostic accuracy of imaging AD biomarkers is at least as dependent on how the biomarker is measured as on the biomarker itself. Standard operating procedures are key to biomarker use in the clinical routine and drug trials. PMID:23897875

  10. Thinking and practice of anonymous review system for doctoral dissertations%博士学位论文双盲评审的实践与思考

    Institute of Scientific and Technical Information of China (English)

    岳国峰

    2011-01-01

    博士学位论文双盲评审制度是全面评价博士生科研能力和学术素养的有效手段,在博士学位论文质量控制过程中效果明显.同时,博士学位论文双盲评审制度也存在一些局限性,需要在实践中不断完善与发展,不断探索创新.%The anonymous review system for doctoral dissertations is an effective way of comprehensively evaluating the research capability and academic cultivation of doctoral students. It brings remarkable results in the quality control process of doctoral dissertations. However, the anonymous review system for doctoral dissertations also has some limitations. Unceasing development and improvement are needed in the practice, as well as continuous creation and exploration.

  11. Reading (and Not Reading Anonymity: Daniel Defoe, An Essay on the Regulation of the Press and A Vindication of the Press

    Directory of Open Access Journals (Sweden)

    Mark Vareschi

    2015-06-01

    Full Text Available In this essay I take up the anonymous An Essay on the Regulation of the Press (1704 and A Vindication of the Press (1718, both regularly attributed to Daniel Defoe. While the pamphlets themselves consider anonymity essential to a work being read and interpreted, paradoxically, twentieth- and twenty-first century critics insist on correct attribution as the starting point for interpretation. The consequences and benefits of authorial attribution to these, and other, minor works are not insignificant. The attribution of authorship to a known author ensures that a work will survive; it may even ensure that a work is subject to study and analysis. However, authorial attribution may also foreclose study and analysis because the attributed work, if it is to be by the named author, must be made to cohere within a larger body of work.

  12. Are 'anonymous' and 'non-directed' prerequisites for living altruistic donation? The views of transplant physicians from France and Québec.

    Science.gov (United States)

    Fortin, Marie-Chantal; Dion-Labrie, Marianne; Hébert, Marie-Josée; Achille, Marie; Doucet, Hubert

    2008-07-01

    It can be argued that living altruistic donors should remain anonymous and should not express preferences in the selection of organ recipients. This study aimed to describe the views of transplant physicians in France and Québec regarding these issues. A total of 27 French and 19 Québec renal transplant physicians took part in individual, semi-directed interviews. Almost all of the physicians agreed that anonymity is mandatory in living altruistic donation (LAD). Regarding the issue of directed donation, most of the French physicians (78%) were opposed to any form of the practice, compared to only a third of their Québec colleagues (32%). We found that these positions were embedded in their respective cultural, legal and social contexts. These results afford a better understanding of these complex issues in two different cultural contexts, and will be useful in the development of international guidelines for LAD. PMID:18406031

  13. Multidimensional profiling of cell surface proteins and nuclear markers

    Energy Technology Data Exchange (ETDEWEB)

    Han, Ju; Chang, Hang; Andarawewa, Kumari; Yaswen, Paul; Helen Barcellos-Hoff, Mary; Parvin, Bahram

    2009-01-30

    Cell membrane proteins play an important role in tissue architecture and cell-cell communication. We hypothesize that segmentation and multidimensional characterization of the distribution of cell membrane proteins, on a cell-by-cell basis, enable improved classification of treatment groups and identify important characteristics that can otherwise be hidden. We have developed a series of computational steps to (i) delineate cell membrane protein signals and associate them with a specific nucleus; (ii) compute a coupled representation of the multiplexed DNA content with membrane proteins; (iii) rank computed features associated with such a multidimensional representation; (iv) visualize selected features for comparative evaluation through heatmaps; and (v) discriminate between treatment groups in an optimal fashion. The novelty of our method is in the segmentation of the membrane signal and the multidimensional representation of phenotypic signature on a cell-by-cell basis. To test the utility of this method, the proposed computational steps were applied to images of cells that have been irradiated with different radiation qualities in the presence and absence of other small molecules. These samples are labeled for their DNA content and E-cadherin membrane proteins. We demonstrate that multidimensional representations of cell-by-cell phenotypes improve predictive and visualization capabilities among different treatment groups, and identify hidden variables.

  14. MetaGeneAnnotator: Detecting Species-Specific Patterns of Ribosomal Binding Site for Precise Gene Prediction in Anonymous Prokaryotic and Phage Genomes

    OpenAIRE

    Noguchi, Hideki; Taniguchi, Takeaki; Itoh, Takehiko

    2008-01-01

    Recent advances in DNA sequencers are accelerating genome sequencing, especially in microbes, and complete and draft genomes from various species have been sequenced in rapid succession. Here, we present a comprehensive gene prediction tool, the MetaGeneAnnotator (MGA), which precisely predicts all kinds of prokaryotic genes from a single or a set of anonymous genomic sequences having a variety of lengths. The MGA integrates statistical models of prophage genes, in addition to those of bacter...

  15. RESEARCH ON ANONYMOUS COMMUNICATION TECHNOLOGIES IN AD HOC NETWORKS%无线 Ad hoc 网络匿名通信技术研究

    Institute of Scientific and Technical Information of China (English)

    王秀芝; 石志东; 房卫东; 张小珑; 单联海

    2016-01-01

    无线 Ad hoc 网络(MANET)的多跳、自组织、无固定设施以及运算资源有限等特性,使得传统网络中复杂度高的安全算法难以应用于其中。而采用与匿名技术相结合的安全机制,可较好地解决节点隐私和通信关系保密的安全问题。针对现有的匿名技术,采用对比分析的方法,对传统网络的匿名技术进行分析,总结技术上的优缺点,研究 Ad hoc 网络的匿名技术,并对比分析各种匿名通信协议的安全性能,为后续的研究与应用提供帮助。%Due to the features of Ad hoc networks such as multi-hop,self-organisation,non-infrastructure and limited resource,the security algorithms with high complexity in traditional networks are hard to be used in it.However to use the security mechanism combining with anonymous technology can well solve the security problem in regard to nodes’privacy and communication relationship secret.In this paper,targeted at existing anonymous technologies,we analyse their use in traditional networks with the method of comparative analysis, summarise the advantages and disadvantages in terms of technology,and meanwhile study the anonymous technologies used in Ad hoc networks,as well as compare and analyse the security performances of various anonymous communication protocol,these provide the help for subsequent researches and applications.

  16. Voluntary anonymous linked study of the prevalence of HIV infection and hepatitis C among inmates in a Canadian federal penitentiary for women.

    OpenAIRE

    Ford, P M; White, C; KAUFMANN, H.; MacTavish, J; Pearson, M.; Ford, S.; Sankar-Mistry, P; Connop, P

    1995-01-01

    OBJECTIVE: To determine the seroprevalence of HIV infection and hepatitis C among inmates of a federal penitentiary for women. DESIGN: Voluntary, anonymous, linked, point-prevalence study involving testing of blood samples for antibodies to HIV and hepatitis C virus. PARTICIPANTS: All inmates of the multilevel security federal Prison for Women, Kingston, Ont., who volunteered to participate in the study. Inmates at this long-stay facility are from across Canada. OUTCOME MEASURE: Seroprevalenc...

  17. 基于隐私决策度的改进k-匿名算法%Improved Algorithm of k-anonymity Based on Degree of Privacy Preservation

    Institute of Scientific and Technical Information of China (English)

    申艳光; 闫晶星; 刘永红; 郭高尚

    2015-01-01

    现有的匿名化隐私保护技术在进行数据发布和数据共享前对于敏感属性的个性化隐私保护的支持存在不足,为了实现更为合理的个性化隐私保护,结合粒计算粗糙集理论和k-匿名理论的最新研究成果,针对电子商务中隐私保护个性化决策选择度的不同,从粒化角度出发,提出一种基于隐私决策度的改进k-匿名算法。经实验验证,该算法更好的实现了隐私保护的个性化,同时其隐私保护精度方面优于已有的p-Sensitive k-匿名算法。%In the existing anonymous privacy protection technology, there is a shortage of personalized privacy protection support for sensitive attributes before data release and sharing. In order to achieve more reasonable personalized privacy preservation and improve the precision of privacy preservation, this paper reviewed the latest researches in granular computing theory, rough set theory and k-anonymity theory, and presented an improved algorithm of k-anonymity based on the personalized decision degree of privacy preservation, in view of different personalized granularity decision selectivity of privacy preservation in E-business.The experimental results show that the novel algorithm can achieve privacy preservation with more reasonable personalization, and its accuracy of privacy preservation is superior to p-sensitive k-anonymity algorithm.

  18. Medical students’ education on organ donation and its evaluation during six consecutive years: results of a voluntary, anonymous educational intervention study

    OpenAIRE

    Radunz, Sonia; Benkö, Tamás; Stern, Sabrina; Saner, Fuat H.; Paul, Andreas; Kaiser, Gernot M

    2015-01-01

    Background One of the main reasons for organ shortage is insufficient education on organ donation. Knowledgeable medical students could share the information with friends and families resulting in a positive attitude to organ donation of the general public. Methods During six consecutive years (2009 to 2014), we conducted a voluntary, anonymous educational intervention study on organ donation among fourth year medical students in the course of the main surgery lecture at the University of Ess...

  19. Comparison of Mental Health and Family Efficiency between the Addicts’ Families Participating and not Participating in the Sessions of Anonymous Addicts

    OpenAIRE

    Jahangir Karami; Kazem Geram; Maryam Gharibi

    2010-01-01

    Objective: The aim of this research was to compare the mental health and family efficiency between the addicts’ families participating and not participating in the group sessions of Anonymous Addicts’ families (Naranan) in city of Kermanshah. Method: It was a descriptive and inferential statistical method project that the total sample size was 30 persons who were selected with simple random sampling among the addicts’ families members participating in Naranan family groups attending for a per...

  20. 基于匿名化处理的报警关联分析技术研究%Study of alert correlation analysis technique based on anonymization

    Institute of Scientific and Technical Information of China (English)

    廖传谱; 连一峰

    2009-01-01

    Data generated by security systems may include sensitive information that data owners do not want to disclose or share with others.Therefore, efficient anonymization of the alert data containing privacy is necessary before they are shared and made correlation analysis.Anonymization of the original alerts containing privacy is dealt with by using concept hierarchy in this paper,on the basis of which the correlation analysis of anonymized alerts is carried out with altered probabilistic similarity based approaches.The result of experiments proves effective correlation approaches fit with anonymized alerts.%由安全系统产生的数据可能会包含一些比较敏感的信息,而这些敏感的信息又是数据拥有者不愿意公开或与别人共享的.因此.为了保持报警数据的隐私和可用性,需要对含有隐私的报警数据在被共享和关联分析之前进行有效的匿名化处理.利用概念层次对含有隐私的原始报警进行匿名化处理,在此基础上采用改进后的基于概率相似度的关联方法对匿名后的报警进行关联分析.实验结果表明,所采取的针对匿名报警的关联方法是有效的.