Anonymity

Results: 917



#Item
171Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
172

iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2014-05-26 09:37:41
    173

    Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2011-01-18 08:48:08
      174Anonymity / Privacy / Biotechnology / Biology / Data protection / De-identification / Data Privacy Lab / DNA / Applied ethics / Information

      Microsoft Word - CMU-ISRIdoc

      Add to Reading List

      Source URL: reports-archive.adm.cs.cmu.edu

      Language: English - Date: 2004-05-04 18:01:19
      175

      Mixcoin: Anonymity for Bitcoin with Accountable Mixes Joseph Bonneau1(B) , Arvind Narayanan1 , Andrew Miller2 , Jeremy Clark3 , Joshua A. Kroll1 , and Edward W. Felten1 1

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2014-11-21 22:44:04
        176

        Dovetail: Stronger Anonymity in Next-Generation Internet Routing Jody Sankey and Matthew Wright University of Texas at Arlington ,

        Add to Reading List

        Source URL: www.petsymposium.org

        Language: English - Date: 2014-06-27 07:04:35
          177File sharing networks / File sharing / Onion routing / Routing / Tor / Peer-to-peer / Gnutella / Anonymous P2P / Freenet

          Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara {krishnap, alessandra, ravenben}@cs.ucsb.edu Abstract—Protecting user pr

          Add to Reading List

          Source URL: www.cs.ucsb.edu

          Language: English - Date: 2008-09-05 20:22:44
          178

          L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; ACHIEVING k-ANONYMITY PRIVACY

          Add to Reading List

          Source URL: dataprivacylab.org

          Language: English - Date: 2013-10-01 06:58:18
            179

            How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2007-08-07 14:50:48
              180

              Anonymity on Quicksand Using BGP to compromise Tor Laurent Vanbever ETH ZĂĽrich

              Add to Reading List

              Source URL: www.vanbever.eu

              - Date: 2015-05-25 10:11:59
                UPDATE