Anonymity

Results: 917



#Item
261Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-03-09 14:36:12
262Ethics / Cryptography / Cryptographic software / Software / File sharing networks / Tor / Anonymity / Computer security conference / Peer-to-peer / Internet privacy / Identity management / Social issues

Rob G. Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Avenue SW Washington, DC 20375

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
263Electronic commerce / Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Electronic money / Anonymity / Silk Road / Consensus / Software / Cryptography / Computing

Mixcoin Anonymity for Bitcoin with accountable mixes (Full version) Joseph Bonneau1 , Arvind Narayanan1 , Andrew Miller2 , Jeremy Clark3 , and Joshua A. Kroll1 and Edward W. Felten1 1

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-08 16:59:47
264Rights / Computer law / Privacy / Freedom of speech / Internet privacy / Global Network Initiative / Anonymity / Information privacy / Encryption / Ethics / Human rights / Law

A/HRCAdvance Edited Version Distr.: General 22 May 2015 Original: English

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-05-28 19:00:45
265Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2010-12-30 09:39:44
266Computing / Security / HTTP cookie / Information security / Anonymity / Personally identifiable information / P3P / In re Gateway Learning Corp. / Internet privacy / Ethics / Privacy

Privacy Policy Privacy Statement We have a strong commitment to protect the privacy of the users and to protect personal information of our visitors and users. This Privacy Policy statement aims to ensure the protection

Add to Reading List

Source URL: videeback.com

Language: English - Date: 2013-05-08 13:58:00
267Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
268Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
269Network architecture / Onion routing / Tor / Crowds / Communications protocol / Proxy server / Router / Internet privacy / Computing / Internet

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:13:22
270Computing / Privacy / HTTP cookie / Personally identifiable information / Anonymity / P3P / Zombie cookie / Internet privacy / Ethics / Internet

DIAGNOSTIC LABORATORIES ONLINE PRIVACY STATEMENT Welcome to our website, www.diaglab.com! This site is owned by Diagnostic Laboratories (DL). This Privacy Statement is designed to tell you about our practices regarding c

Add to Reading List

Source URL: www.diaglabs.com

Language: English - Date: 2015-02-24 10:10:04
UPDATE