Anonymity

Results: 917



#Item
151

“On the Internet, Nobody Knows You’re a Dog”: A Twitter Case Study of Anonymity in Social Networks Sai Teja Peddinti* *

Add to Reading List

Source URL: cosn.acm.org

Language: English - Date: 2014-09-11 04:01:22
    152

    Protecting DNA Sequence Anonymity with Generalization Lattices Bradley Malin October 2004 CMU-ISRI

    Add to Reading List

    Source URL: reports-archive.adm.cs.cmu.edu

    Language: English - Date: 2004-10-20 11:51:27
      153

      2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing An Analysis of Anonymity in the Bitcoin System Fergal Reid Martin Harrigan

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:45
        154

        9th International Workshop on Privacy and Anonymity in the Information Society (PAIS’16) (http://www.mathcs.emory.edu/pais16/) In conjunction with EDBT/ICDT 2016 Bordeaux, France – March 15, 2016 Workshop Chairs

        Add to Reading List

        Source URL: www.mathcs.emory.edu

        Language: English - Date: 2015-09-04 09:14:19
          155Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

          Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

          Add to Reading List

          Source URL: dedis.cs.yale.edu

          Language: English - Date: 2012-06-25 13:47:28
          156

          Anonymity on Quicksand Using BGP to compromise Tor Laurent Vanbever Princeton/ETH Zürich

          Add to Reading List

          Source URL: vanbever.eu

          - Date: 2014-10-28 13:50:32
            157

            Anonymity with Identity Escrow Aybek Mukhamedov and Mark Ryan The University of Birmingham March 30, 2006

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2010-03-26 10:05:33
              158

              “You’re Either Anonymous or You’re Not!”: Variations on Anonymity in Modern and Early Modern Culture1 ! Kate E. Tunstall

              Add to Reading List

              Source URL: www.mod-langs.ox.ac.uk

              Language: English - Date: 2012-01-17 13:05:25
                159Computing / Edsger W. Dijkstra / Computer architecture / Mathematics / Telecommunications / Network architecture / Routing / Mesh networking / Overlay network / Shortest path problem / Onion routing / Crowds

                Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao Computer Science Department, University of California at Santa Barbara {krishnap, alessandra,

                Add to Reading List

                Source URL: www.cs.ucsb.edu

                Language: English - Date: 2009-02-10 01:19:21
                160

                How (Not) to Apply Differential Privacy to Anonymity Networks Scott Coull

                Add to Reading List

                Source URL: www.scottcoull.com

                Language: English - Date: 2014-03-03 12:03:12
                  UPDATE