Search results

1 – 2 of 2
Article
Publication date: 20 December 2007

Tianbo Lu, Binxing Fang, Yuzhong Sun and Xueqi Cheng

As a peer‐to‐peer scalable anonymous communication system, WonGoo is a tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the anonymity, but at…

Abstract

Purpose

As a peer‐to‐peer scalable anonymous communication system, WonGoo is a tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the anonymity, but at the same time the heavier the overhead. WonGoo lengthens the anonymity path and reduces the overhead, providing strong anonymity and high efficiency with layered encryption and random forwarding. The purpose of this paper is to analyze its performance in detail.

Design/methodology/approach

The paper focuses on measure the performance of WonGoo system with probability theory. First, it gives a brief description of the system and evaluate its payload. Then it presents a detailed security analysis of the system.

Findings

It is shown that WonGoo can protect against (n − 1) attack and provide variable anonymity, as well as how confident the collaborators can be that their immediate predecessor is in fact the path initiator. The paper measures the anonymity degree provided by WonGoo system based on information entropy and compare it with other anonymity systems.

Practical implications

The paper is helpful for the further development of WonGoo system. In addition, the results presented in this paper will be useful for users to design other anonymity system.

Originality/value

WonGoo is a peer‐to‐peer anonymity system that provides strong anonymity and high efficiency with layered encryption and random forwarding. The paper presents a detailed analysis of its performance with probability theory and measures its anonymity degree with information theory.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 June 2016

Magdalena Wójcik

The purpose of this paper is to subject the potential of Internet of Things (IoT) technology for libraries in terms of the possible scope and usage forms of this technology in…

5685

Abstract

Purpose

The purpose of this paper is to subject the potential of Internet of Things (IoT) technology for libraries in terms of the possible scope and usage forms of this technology in public and academic library services.

Design/methodology/approach

Based on analysis of the subject literature, the main areas of IoT applications in commercial institutions were identified, then an analysis of Library and Information Science English-language literature from the years 2010 to 2015 was conducted in order to create a profile of modern library services. The range of activities of commercial and non-commercial institutions were compared to ascertain if areas in which commercial entities using or planning to use IoT could also be an inspiration for libraries. In this way, a theoretical model of IoT use in library activities was developed.

Findings

The research showed that IoT technology might have the potential to be used in library services and other activities, similar to how it is implemented in the commercial sector.

Research limitations/implications

The aim of the paper is to determine the possible, not the actual, scope and forms of using this technology in public and academic libraries’ services.

Practical implications

The results can be widely used in libraries as an inspiration for the use of IoT technology in modern library services.

Social implications

The use of new technologies in libraries can help to improve the image of these institutions in the eyes of users, especially the younger generation.

Originality/value

The use of IoT in libraries is a new issue that has not been studied much yet. The issue of using the potential of this technology for the needs of libraries has, in recent years, been raised at international conferences, become a subject of interest to librarian associations, and been widely discussed in the blogosphere, thus proving that this topic is important to practitioners. It is difficult, however, to find any scientific, comprehensive studies of this topic.

Details

Library Hi Tech, vol. 34 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 2 of 2