Anonymity

Results: 917



#Item
881Internet activism / Film / Twelve-step programs / Internet vigilantism / Activism / Project Chanology / Anonymity / Anonymous / Cybercrime / Information society / Internet censorship

NPR/USA  University  Planned Giving Survey   Station  Station Comments  Alliance 

Add to Reading List

Source URL: www.us-alliance.org

Language: English - Date: 2010-08-31 15:23:29
882Anonymity

Why  anonymity  fails   Ross  Anderson   Cambridge  University  

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-04 17:06:32
    883Bequest / Anonymity / Landford / Project Chanology / Anonymous / Computing / Film / Email / Internet

    Giles Lane, Landford, Salisbury. SP5 2BG Tel: [removed]Fax: [removed]

    Add to Reading List

    Source URL: www.dentaid.org

    Language: English - Date: 2013-09-06 05:13:34
    884Privacy / Internet / HTTP cookie / Personally identifiable information / Anonymity / Network Advertising Initiative / In re Gateway Learning Corp. / Internet privacy / Ethics / Computing

    activ8-3d PRIVACY STATEMENT We respect your privacy and recognize the need for appropriate protection and management of any personally identifiable information you may share with us (the phrase “personally identifiable

    Add to Reading List

    Source URL: www.activ8-3d.co.uk

    Language: English - Date: 2008-11-07 15:08:05
    885Ethics / Privacy / Email / Federal Trade Commission / HTTP cookie / Personally identifiable information / Web bug / Anonymity / In re Gateway Learning Corp. / Internet privacy / Internet / Computing

    PRIVACY POLICY (Effective & Last Modified September12, 2013) Welcome to www.capetesting.com ("Website"), an interactive online service operated by Indiana Mills & Manufacturing Inc. (“IMMI”, "us", "we", or "our"). Pl

    Add to Reading List

    Source URL: www.capetesting.com

    Language: English - Date: 2014-05-06 13:49:48
    886Tor / Comparison of BitTorrent clients / Vuze / Libtorrent / Magnet URI scheme / The Pirate Bay / Peer-to-peer / QBittorrent / Peer exchange / Software / BitTorrent / Computing

    Compromising Tor Anonymity Exploiting P2P Information Leakage Pere Manils, Abdelberi Chaabane, Stevens Le Blond,

    Add to Reading List

    Source URL: hal.inria.fr

    Language: English - Date: 2011-06-24 10:44:02
    887Computing / Data management / Operations research / NP / Mathematical optimization / Attrib / Tuple / Pruning / Complexity classes / Mathematics / Applied mathematics

    Data Anonymization Generalization Algorithms Li Xiong, Slawek Goryczka CS573 Data Privacy and Anonymity

    Add to Reading List

    Source URL: www.mathcs.emory.edu

    Language: English - Date: 2012-02-01 16:27:22
    888Internet / Tor / .onion / Onion routing / Proxy server / Traffic analysis / Anonymizer / ANts P2P / Peer-to-peer / Internet privacy / Software / Computing

    Challenges in deploying low-latency anonymity (DRAFT) Roger Dingledine1 , Nick Mathewson1 , and Paul Syverson2 1

    Add to Reading List

    Source URL: www.onion-router.net

    Language: English - Date: 2013-01-23 17:13:53
    889Information society / Retraction / Dănuţ Marcu / Anonymity / Anonymous / Tipster / Project Chanology / Plagiarism / Scientific misconduct / Cybercrime / Science

    Opinion[removed]

    Add to Reading List

    Source URL: www.labtimes.org

    Language: English - Date: 2012-02-08 17:20:33
    890Internet / Tor / Crowds / Degree of anonymity / Onion routing / Traffic analysis / Denial-of-service attack / Routing / ANts P2P / Internet privacy / Computing / Software

    Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems Adam Back, Ulf M¨oller, and Anton Stiglic

    Add to Reading List

    Source URL: www.cypherspace.org

    Language: English - Date: 2003-11-23 22:37:27
    UPDATE