Anonymity

Results: 917



#Item
1Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 19:28:54
2TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
3An Empirical Analysis of Anonymity in Zcash  arXiv:1805.03180v1 [cs.CR] 8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London

An Empirical Analysis of Anonymity in Zcash arXiv:1805.03180v1 [cs.CR] 8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-05-08 20:55:47
4arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-02-25 20:30:14
5An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London {georgios.kappos.16,h.yousaf,mary.maller.15,s.meiklejohn}@ucl.ac.uk  Abstract

An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London {georgios.kappos.16,h.yousaf,mary.maller.15,s.meiklejohn}@ucl.ac.uk Abstract

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
6StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
7TASP: Towards Anonymity Sets that Persist Jamie Hayes Carmela Troncoso  George Danezis

TASP: Towards Anonymity Sets that Persist Jamie Hayes Carmela Troncoso George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-09-14 17:31:17
8Exploiting Anonymity in Approximate Linear Programming: Scaling to Large Multiagent MDPs

Exploiting Anonymity in Approximate Linear Programming: Scaling to Large Multiagent MDPs

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2017-11-03 18:51:37
    9Proceedings on Privacy Enhancing Technologies ; ):1–18  Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

    Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    10An Empirical
 
 An Empirical Analysis of Anonymity in Zcash
 


    An Empirical
 
 An Empirical Analysis of Anonymity in Zcash
 


    Add to Reading List

    Source URL: georgekap.github.io

    - Date: 2018-09-14 13:39:28