Anonymity

Results: 917



#Item
141

A Game-Theoretic Analysis of Cooperation in Anonymity Networks Mu Yang, Vladimiro Sassone ECS, University of Southampton

Add to Reading List

Source URL: www.cryptoforma.org.uk

Language: English - Date: 2012-09-24 17:58:08
    142

    Re3: Relay Reliability Reputation for Anonymity Systems Anupam Das, Nikita Borisov University of Illinois at Urbana-Champaign {das17,nikita}@illinois.edu

    Add to Reading List

    Source URL: www.hatswitch.org

    Language: English - Date: 2014-06-02 11:43:39
      143

      Unraveling an Old Cloak: k-anonymity for Location Privacy Reza Shokri† , Carmela Troncoso‡ , Claudia Diaz‡ , Julien Freudiger† , and Jean-Pierre Hubaux† ‡ †

      Add to Reading List

      Source URL: www.shokri.org

      Language: English - Date: 2015-05-28 18:54:40
        144

        Anonymity Loves Company: Usability and the Network Effect Roger Dingledine and Nick Mathewson The Free Haven Project {arma,nickm}@freehaven.net

        Add to Reading List

        Source URL: www.econinfosec.org

        Language: English - Date: 2006-07-20 16:57:24
          145

          Anonymouth Revamped: Getting Closer to Stylometric Anonymity   Andrew W.E. McDonald, Hoa Vu, Marc Barrowclift, Jeff Ulman, and Rachel Greenstadt PSAL, Drexel University

          Add to Reading List

          Source URL: obfuscationsymposium.org

          Language: English - Date: 2014-04-04 12:04:47
            146

            How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

            Add to Reading List

            Source URL: people.cis.ksu.edu

            Language: English - Date: 2011-07-01 14:16:47
              147

              Formal analysis of anonymity in ECC-based Direct Anonymous Attestation schemes? Ben Smyth1 , Mark Ryan2 , and Liqun Chen3 1 2

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              Language: English - Date: 2011-09-05 09:16:45
                148

                Anonymity on Quicksand Using BGP to compromise Tor Laurent Vanbever Princeton/ETH Zürich

                Add to Reading List

                Source URL: www.vanbever.eu

                - Date: 2014-10-28 13:50:32
                  149Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

                  Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

                  Add to Reading List

                  Source URL: www.vanbever.eu

                  Language: English - Date: 2014-10-08 09:38:20
                  150

                  Microsoft PowerPoint - dec1-privacy-anonymity

                  Add to Reading List

                  Source URL: inst.eecs.berkeley.edu

                  Language: English - Date: 2008-12-02 16:43:23
                    UPDATE