Anonymity

Results: 917



#Item
1Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 19:28:54
2Computing / Information and communications technology / Computer networking / Data transmission / Network performance / Internet architecture / Teletraffic / Telecommunications engineering / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
3Cryptocurrencies / Exonumia / Numismatics / Money / Zcash / Bitcoin / Kraken / Monero / Bitcoin Private

An Empirical Analysis of Anonymity in Zcash arXiv:1805.03180v1 [cs.CR] 8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-05-08 20:55:47
4Computing / Information and communications technology / Data transmission / Computer networking / Network performance / Routing / Internet architecture / Teletraffic / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-02-25 20:30:14
5Cryptocurrencies / Exonumia / Numismatics / Money / Zcash / Bitcoin / Kraken / Monero / Bitcoin Private

An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London {georgios.kappos.16,h.yousaf,mary.maller.15,s.meiklejohn}@ucl.ac.uk Abstract

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
6Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
7Computing / Digital rights / Secure communication / Cryptography / Internet privacy / Anonymity / Crypto-anarchism / Mix network / Traffic analysis / Tor / Onion routing / Anonymous post

TASP: Towards Anonymity Sets that Persist Jamie Hayes Carmela Troncoso George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-09-14 17:31:17
8

Exploiting Anonymity in Approximate Linear Programming: Scaling to Large Multiagent MDPs

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2017-11-03 18:51:37
    9Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

    Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    10

    An Empirical
 
 An Empirical Analysis of Anonymity in Zcash
 


    Add to Reading List

    Source URL: georgekap.github.io

    - Date: 2018-09-14 13:39:28
      UPDATE