Anonymity

Results: 917



#Item
71Computing / Internet / Cryptography / Anonymity / Dark web / Anonymous remailer / Email / Pseudonymity / Internet privacy / Tor / Dining cryptographers problem

Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-01-20 15:00:46
72Computing / Distributed data storage / Network architecture / Internet / Crowds / Onion routing / Tapestry / Routing / IP multicast / Multicast / Pastry / Degree of anonymity

AP3: Cooperative, decentralized anonymous communication Alan Mislove† Gaurav Oberoi† Ansley Post†

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2004-09-10 14:15:12
73Television / Broadcasting / Survey methodology / News media / Anonymity / Source / Interview / RT

Finding Out the Truth in School: Methods and Strategies for Getting it Right Background knowledge and checking on the information you’ve been given are the biggest assets in determining when you’ve been told the tru

Add to Reading List

Source URL: www.robertgreenman.com

Language: English - Date: 2010-03-08 20:44:21
74World Wide Web / Digital media / Anonymity / Music industry / Blogging / Blog / Diaries / New media / Web 2.0 / Pseudonymity / Ambition / Anonymous blog

Cites & Insights: Crawford at Large

Add to Reading List

Source URL: citesandinsights.info

Language: English - Date: 2012-08-13 22:41:17
75Computing / Network architecture / Internet / Internet Standards / Dynamic Host Configuration Protocol / Network service / DHCPv6 / IPv6

DHCP Anonymity Profile Update h"ps://datatracker.ie0.org/doc/dra3-­‐ie0-­‐dhc-­‐ anonymity-­‐profile/   IETF  93,  Prague,  July  2015  

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-07-23 06:26:56
76Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
77Death customs / Anonymity / Metaphors / Unmarked grave / Cemetery / Headstone / Burial / Culture / Real estate / Death

Microsoft Word - MembershipNewsletter2013_vsn3.docx

Add to Reading List

Source URL: www.friendsofcems.org

Language: English - Date: 2016-02-07 12:11:57
78Anonymity / Internet / Technology / Economy / Business / Whistleblower

About EthicsPoint Reporting – General Reporting Security & Confidentiality Tips & Best Practices About EthicsPoint

Add to Reading List

Source URL: secure.ethicspoint.eu

Language: English - Date: 2014-04-09 17:02:58
79Cryptography / Public-key cryptography / Public key infrastructure / Key management / E-commerce / Group signature / Trusted Computing / Certificate authority / Anonymity / Digital signature / Public key certificate / Direct Anonymous Attestation

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
80Cryptography / Internet privacy / Crypto-anarchism / Mix network / Secure communication / Mixminion / Anonymity / Computer security

Blending different latency traffic with alpha-mixing Roger Dingledine1 , Andrei Serjantov2 , and Paul Syverson3 1 The Free Haven Project ()

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2006-09-20 13:35:32
UPDATE