Anonymity

Results: 917



#Item
11Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.usenix.org

Language: English
12Combined Specific Feedback and Ideas on the Five Goals Outlined in the Strategic Plan IOA State of the Association Annual Meeting, Miami April, 2013 To help protect anonymity, tables as set up at the State of the Associa

Combined Specific Feedback and Ideas on the Five Goals Outlined in the Strategic Plan IOA State of the Association Annual Meeting, Miami April, 2013 To help protect anonymity, tables as set up at the State of the Associa

Add to Reading List

Source URL: www.ombudsassociation.org

Language: English - Date: 2014-05-13 17:27:29
    13Learning from data retention logging for an anonymity service Stefan Köpsell1 and Petr Švenda2 1  2

    Learning from data retention logging for an anonymity service Stefan Köpsell1 and Petr Švenda2 1 2

    Add to Reading List

    Source URL: crocs.fi.muni.cz

    Language: English - Date: 2014-09-21 19:02:02
      14Dynamix: Anonymity on Dynamic Social Structures Abedelaziz Mohaisen Yongdae Kim  Verisign Labs, VA, USA

      Dynamix: Anonymity on Dynamic Social Structures Abedelaziz Mohaisen Yongdae Kim Verisign Labs, VA, USA

      Add to Reading List

      Source URL: www.cs.ucf.edu

      Language: English - Date: 2017-08-24 12:04:18
        15The Effect of DNS on Tor’s Anonymity Benjamin Greschbach∗ Tobias Pulls∗  Laura M. Roberts∗

        The Effect of DNS on Tor’s Anonymity Benjamin Greschbach∗ Tobias Pulls∗ Laura M. Roberts∗

        Add to Reading List

        Source URL: nymity.ch

        Language: English - Date: 2017-08-25 13:31:02
          16Mixcoin: Anonymity for Bitcoin with Accountable Mixes Joseph Bonneau1(B) , Arvind Narayanan1 , Andrew Miller2 , Jeremy Clark3 , Joshua A. Kroll1 , and Edward W. Felten1 1

          Mixcoin: Anonymity for Bitcoin with Accountable Mixes Joseph Bonneau1(B) , Arvind Narayanan1 , Andrew Miller2 , Jeremy Clark3 , Joshua A. Kroll1 , and Edward W. Felten1 1

          Add to Reading List

          Source URL: users.encs.concordia.ca

          Language: English - Date: 2014-11-21 22:44:04
            17On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1  K.U. Leuven ESAT-COSIC

            On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1 K.U. Leuven ESAT-COSIC

            Add to Reading List

            Source URL: carmelatroncoso.com

            Language: English - Date: 2015-11-19 22:16:28
              18Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two Debajyoti Das Sebastian Meiser

              Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two Debajyoti Das Sebastian Meiser

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2018-03-02 16:52:30
                19iii  Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

                iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

                Add to Reading List

                Source URL: nymity.ch

                Language: English - Date: 2017-08-25 13:31:01
                20Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham  Anonymity with identity escrow attempts to allow users of an on-line service to remai

                Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2011-01-18 08:48:08