Anonymity

Results: 917



#Item
301Concurrent computing / Chord / Distributed hash table / Peer-to-peer / Routing / Freenet / Anonymity / Overlay network / Distributed data storage / Computing / Software

Evaluating Sender and Recipient Anonymity in a Structured Overlay ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-10-03 10:37:24
302System software / Proxy server / Anonymizer / Open proxy / Anonymous web browsing / Tor / Crowds / HTTP cookie / Cache / Internet privacy / Computing / Internet

Using caching for browsing anonymity ANNA M. SHUBINA and SEAN W. SMITH Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:46:12
303Concurrent computing / Chord / Peer-to-peer / Distributed hash table / Pastry / Tapestry / Overlay network / Freenet / Routing / Distributed data storage / Computing / Software

NEBLO: Anonymity in a Structured Overlay Giuseppe Ciaccio DISI, Universit`a di Genova via DodecanesoGenova, Italy

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-05-18 07:19:02
304National security / Privacy / Surveillance / Public safety / Media / Anonymity / Critical theory / Security / Crime prevention / Law enforcement

A1310_06_F-MusicTech.indd

Add to Reading List

Source URL: www.leoalmanac.org

Language: English - Date: 2014-02-11 08:32:32
305Computing / Anonymity / Human rights / Proxy server / Privacy / Internet privacy / Ethics / Internet

Anonymity Loves Company: Usability and the network effect Roger Dingledine, Nick Mathewson The Free Haven Project 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2006-07-06 11:48:47
306Hacking / Military technology / Computer crimes / Technology / Terrorism / Cyberterrorism / Anonymity / Internet / Legal aspects of computing / Cyberwarfare / Crime / Electronic warfare

Influence Operations Influence Operations by Fred Cohen, Ph.D. Copyright (c) Fred Cohen 2011

Add to Reading List

Source URL: all.net

Language: English - Date: 2011-09-25 20:42:59
307Cryptographic software / Tor / Internet / Onion routing / Blind signature / Group signature / Computing / Internet privacy / Cryptography / Software

Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 17:40:02
308Anonymity / Computing / Message passing / Internet privacy / System software / Secure communication / Cryptographic protocols / Cryptography / Mixminion / Mix network

Blending different latency traffic with alpha-mixing Roger Dingledine1 , Andrei Serjantov2 , and Paul Syverson3 1 The Free Haven Project ()

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-02-09 23:47:40
309Technology / Identity management / Social issues / Human rights / Internet privacy / Cloud computing / Information privacy / Electronic health record / Internet / Privacy / Ethics / Computing

Standard Clouds, Inc. A game-changing privacy solution that sets a new standard of anonymity and protection for consumers and businesses. September 2014

Add to Reading List

Source URL: we.private.me

Language: English - Date: 2014-09-24 18:04:44
310Anonymity / Information privacy / Medical privacy / Internet Society / Personally identifiable information / Privacy policy / The right to privacy in New Zealand / Privacy / Ethics / Internet privacy

Internet Society of Australia A Chapter of the Internet Society ABNC/- Maddocks, Level 7, 140 William Street Melbourne, Victoria 3000 Accounts: P.O. Box 351, Glenorie NSW Australia 2157

Add to Reading List

Source URL: www.internetsociety.org.au

Language: English - Date: 2010-10-31 01:35:31
UPDATE