Anonymity

Results: 917



#Item
161Internet privacy / Computing / Technology / Government / HTTP cookie / Personally identifiable information / Privacy / Local shared object / Online Privacy Protection Act / Anonymity / Privacy concerns regarding Google / Privacy concerns with social networking services

Clarity Consulting, Inc. Website Privacy Policy This privacy policy (hereafter “Privacy Policy”) applies to ClarityCon.com (hereinafter, "Us", "We", or "ClarityCon.com"), and any other Website that Clarity Consulting

Add to Reading List

Source URL: www.claritycon.com

Language: English - Date: 2015-07-02 18:31:38
162Computing / Internet / Cryptography / Internet privacy / Onion routing / Routing / Tor / Universal composability / Anonymity / Proxy server / IP / Posterior probability

A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

Add to Reading List

Source URL: ohmygodel.com

Language: English - Date: 2012-07-09 20:58:21
163Computing / Internet / Computer security / Internet privacy / Computer network security / Computer networking / Proxy servers / Internet protocols / Tor / Proxy list / Anonymizer / Open proxy

Design of a blocking-resistant anonymity system Roger Dingledine and Nick Mathewson , Tor Tech ReportNovember 2006

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-31 06:11:24
164

On Anonymity with Identity Escrow Aybek Mukhamedov and Mark D. Ryan School of Computer Science University of Birmingham {A.Mukhamedov,M.D.Ryan}@cs.bham.ac.uk

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    165Digital media / Technology / Web-based experiments / Science and technology / Deliverable / Peer-to-peer / Anonymity / Internet / Ultimatum game / Email / Experiment

    QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable DWeb experiments and initial results

    Add to Reading List

    Source URL: qlectives.eu

    Language: English - Date: 2011-08-08 02:58:10
    166

    Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures G. Fuchsbauer D. Pointcheval

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2009-08-23 17:17:30
      167

      Aircloak Cloaked Database Features Overview Aircloak Cloaked Database is the world’s first general-purpose anonymized database service. Aircloak Analytics is unique in that it provides both strong anonymity and high-qu

      Add to Reading List

      Source URL: www.aircloak.com

      Language: English - Date: 2016-03-02 05:49:16
        168Computing / Digital rights / Internet / Digital media / Law / Content-control software / Internet security / Right to Internet access / Internet censorship / Anonymity / Internet privacy / Tor

        Welcome to the World of Human Rights: Please Make Yourself Uncomfortable Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, Connecticut, U.S.A. Email: {henry.corrigan-gibbs, bryan.ford}@yale.edu

        Add to Reading List

        Source URL: dedis.cs.yale.edu

        Language: English - Date: 2013-04-01 10:05:09
        169

        Anonymity on Quicksand Using BGP to compromise Tor Laurent Vanbever ETH Zürich

        Add to Reading List

        Source URL: vanbever.eu

        - Date: 2015-05-25 10:11:59
          170

          A3 : An Extensible Platform for Application-Aware Anonymity Micah Sherr∗ Andrew Mao† William R. Marczak‡ Wenchao Zhou∗ Boon Thau Loo∗ Matt Blaze∗ ∗ University of Pennsylvania

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2010-07-16 14:58:27
            UPDATE