Anonymity

Results: 917



#Item
21

Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems Stevens Le Blond David Choffnes

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:46
    22

    22. exit node repudiation for anonymity networks jeremy clark, philippe gauvin, and carlisle adams Introduction 399 Preliminaries 400

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2013-08-05 10:55:12
      23

      Intimate Anonymity Breaking the Code of the Urban Genome Hillel Schocken auf Deutsch    Ideas and opinions from some of our supporters 

      Add to Reading List

      Source URL: www.intbau.org

      Language: English - Date: 2016-02-22 16:37:23
        24

        Blockchain Intelligence and Anonymity Dr. Adam Joyce Agenda Who we are

        Add to Reading List

        Source URL: bitcoinschool.gr

        Language: English - Date: 2016-11-28 10:33:54
          25

          Research and Challenges on Bitcoin Anonymity? Jordi Herrera-Joancomart´ı Dept. d’Enginyeria de la Informaci´ o i les Comunicacions Universitat Aut` onoma de Barcelona

          Add to Reading List

          Source URL: www.deic.uab.cat

          Language: English - Date: 2015-03-11 15:57:04
            26

            The VLDB Journal:567–588 DOIs00778REGULAR PAPER Anonymity meets game theory: secure data integration

            Add to Reading List

            Source URL: dmas.lab.mcgill.ca

            Language: English - Date: 2015-03-01 01:03:51
              27

              An Analysis of Anonymity in Bitcoin Using P2P Network Traffic Philip Koshy, Diana Koshy, and Patrick McDaniel Pennsylvania State University, University Park, PA 16802, USA Abstract. Over the last 4 years, Bitcoin, a dec

              Add to Reading List

              Source URL: fc14.ifca.ai

              Language: English - Date: 2014-02-15 11:17:20
                28

                Anonymity, Pseudonymity, and Gender Categorization as Social Justice Issues in HCI Abstract

                Add to Reading List

                Source URL: media.wix.com

                Language: English - Date: 2016-06-22 00:27:02
                  29Computing / Internet / Secure communication / Information and communications technology / Internet architecture / Internet privacy / Internet Standards / Internet protocols / Mix network / Tor / Computer network / Distributed hash table

                  Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov George Danezis

                  Add to Reading List

                  Source URL: www0.cs.ucl.ac.uk

                  Language: English - Date: 2013-10-10 06:48:53
                  30

                  Anonymity and Censorship Resistance in Unstructured Overlay Networks ? Michael Backes4 and Marek Hamerlik1 and Alessandro Linari2 and Matteo Maffei1 and Christos Tryfonopoulos3 and Gerhard Weikum3 2

                  Add to Reading List

                  Source URL: www.sps.cs.uni-saarland.de

                  Language: English - Date: 2013-10-09 19:06:00
                    UPDATE