Anonymity

Results: 917



#Item
131Anonymity / Privacy / Theoretical computer science / Auxy / Cryptography / De-anonymization / Differential privacy / Recommender system / Algorithm / Academia

Provable De-anonymization of Large Datasets with Sparse Dimensions Anupam Datta, Divya Sharma, and Arunesh Sinha Carnegie Mellon University {danupam,divyasharma,aruneshs}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:56
132

How (Not) to Apply Differential Privacy in Anonymity Networks Scott E. Coull RedJack, LLC. Differential privacy is a particularly appealing way of

Add to Reading List

Source URL: www.scottcoull.com

Language: English - Date: 2014-03-03 12:03:10
    133

    1 DAISY: Increasing Scalability and Robustness of Anonymity Systems Chi-Bun Chan and Cristina Nita-Rotaru Department of Computer Sciences

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2005-05-28 12:04:57
      134

      Dovetail: Stronger Anonymity in Next-Generation Internet Routing Jody Sankey and Matthew Wright University of Texas at Arlington ,

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2014-06-27 07:04:35
        135

        Identity on the Internet Security, Traceability, Privacy & Anonymity Louise Bennett W3C Workshop, March 2014 Views on security, traceability, privacy & anonymity

        Add to Reading List

        Source URL: www.w3.org

        - Date: 2014-03-25 19:14:39
          136Anonymity / Digital media / Cryptography / World Wide Web / Crypto-anarchism / Pseudonymity / Blog / Anonymous blog / ScienceBlogs

          Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

          Add to Reading List

          Source URL: www.citesandinsights.info

          Language: English - Date: 2012-08-14 11:05:55
          137

          Analysing Unlinkability and Anonymity Using the Applied Pi Calculus Myrto Arapinis, Tom Chothia, Eike Ritter and Mark Ryan School of Computer Science, University of Birmingham, UK {m.d.arapinis, t.chothia, e.ritter, m.d.

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2010-11-18 09:10:25
            138

            CHICAGO STOCK EXCHANGE TO IMPLEMENT ANONYMITY AT CLEARING FIRST MILESTONE FOR ON-DEMAND SNAPSM AUCTIONS Contact: Mark O’Connor

            Add to Reading List

            Source URL: www.chx.com

            Language: English
              139

              The Commercialization of Reproduction and Donor Anonymity in Canada Prepared by: Brittney Sharp Blackstone Legal Intern 2011 The Center for Bioethics and Culture

              Add to Reading List

              Source URL: www.cbc-network.org

              Language: English - Date: 2012-06-14 19:46:25
                140Spamming / Social information processing / Identity management / Spam filtering / Email / Internet privacy / Sockpuppet / Pseudonymous remailer / Anonymity / Anti-spam techniques / User / Email spam

                Pseudonym Parties: An Offline Foundation for Online Accountability (PRELIMINARY DRAFT) Bryan Ford Massachusetts Institute of Technology March 27, 2007

                Add to Reading List

                Source URL: www.brynosaurus.com

                Language: English - Date: 2010-09-29 09:18:52
                UPDATE