Anonymity

Results: 917



#Item
11Computing / Internet / Anonymity / Cryptography / Internet privacy / Dining cryptographers problem / Internet Standards / Internet Relay Chat / Clientserver model / Anonymous web browsing / Server / Anonymizer

Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.usenix.org

Language: English
12

Combined Specific Feedback and Ideas on the Five Goals Outlined in the Strategic Plan IOA State of the Association Annual Meeting, Miami April, 2013 To help protect anonymity, tables as set up at the State of the Associa

Add to Reading List

Source URL: www.ombudsassociation.org

Language: English - Date: 2014-05-13 17:27:29
    13

    Learning from data retention logging for an anonymity service Stefan Köpsell1 and Petr Švenda2 1 2

    Add to Reading List

    Source URL: crocs.fi.muni.cz

    Language: English - Date: 2014-09-21 19:02:02
      14

      Dynamix: Anonymity on Dynamic Social Structures Abedelaziz Mohaisen Yongdae Kim Verisign Labs, VA, USA

      Add to Reading List

      Source URL: www.cs.ucf.edu

      Language: English - Date: 2017-08-24 12:04:18
        15

        The Effect of DNS on Tor’s Anonymity Benjamin Greschbach∗ Tobias Pulls∗ Laura M. Roberts∗

        Add to Reading List

        Source URL: nymity.ch

        Language: English - Date: 2017-08-25 13:31:02
          16

          Mixcoin: Anonymity for Bitcoin with Accountable Mixes Joseph Bonneau1(B) , Arvind Narayanan1 , Andrew Miller2 , Jeremy Clark3 , Joshua A. Kroll1 , and Edward W. Felten1 1

          Add to Reading List

          Source URL: users.encs.concordia.ca

          Language: English - Date: 2014-11-21 22:44:04
            17

            On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1 K.U. Leuven ESAT-COSIC

            Add to Reading List

            Source URL: carmelatroncoso.com

            Language: English - Date: 2015-11-19 22:16:28
              18

              Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two Debajyoti Das Sebastian Meiser

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2018-03-02 16:52:30
                19Computing / Internet / Information and communications technology / Proxy servers / Internet censorship in China / Internet privacy / Internet security / Secure communication / Tor / Great Firewall / Internet censorship

                iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

                Add to Reading List

                Source URL: nymity.ch

                Language: English - Date: 2017-08-25 13:31:01
                20

                Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2011-01-18 08:48:08
                  UPDATE