Anonymity

Results: 917



#Item
81Secure communication / Cryptography / Onion routing / Routing / Internet privacy / Crypto-anarchism / Tor / Mix network / Dining cryptographers problem / Anonymity / Len Sassaman

Design and Analysis of Efficient Anonymous-Communication Protocols

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-07 16:37:34
82Internet Standards / Internet protocols / Dark web / Internet privacy / Onion routing / Routing / Crowds / Communications protocol / Tor / Proxy server / Public-key cryptography / Anonymity

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2007-01-12 11:50:43
83Privacy / Internet privacy / Targeted advertising / K-anonymity / Anonymity / Personal /  Inc.

Location Based Advertising and Location kAnonymity How can our location information be kept

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-11-17 20:57:35
84Journalism sourcing / Source / Interview / Anonymity / Fact / Draft:PEACE Model

Accuracy is essential in all journalism Image of dartboard by Roscoe Ellis released under Creative Commons Speed and accuracy

Add to Reading List

Source URL: www.mediaideas.co.uk

Language: English - Date: 2016-03-04 02:20:43
85Information privacy / Human rights / Private information retrieval / Internet privacy / Differential privacy / Privacy / Database / Anonymity / Statistical database / Domain Name System

Proceedings on Privacy Enhancing Technologies ; ):184–201 Raphael R. Toledo, George Danezis, and Ian Goldberg Lower-Cost -Private Information Retrieval Abstract: Private Information Retrieval (PIR), despite be

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2016-07-29 09:16:35
86Public-key cryptography / Identity management / Public key infrastructure / Key management / Cryptography / Privacy-enhancing technologies / Pseudonymity / Authentication / Blacklist / User / Internet privacy / Anonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
87File sharing / Chatham-Kent / TekSavvy / Voltage Pictures / Copyright infringement / Internet privacy / Anonymity / Computer law / Legal aspects of file sharing / Trade group efforts against file sharing

Illegal Downloading: the Wild West Comes to an End Vincent Bergeron and Jean-Sébastien & Rodriguez-Paquette Robic LLP Canadian Internet users who illegally download music, movies or television series cannot hide behind

Add to Reading List

Source URL: www.aipf.com

Language: English - Date: 2015-10-29 06:38:58
88Public-key cryptography / Cryptography / Notary / Financial cryptography / E-commerce / Blind signature / Digital signature / Zero-knowledge proof / Proof of knowledge / Anonymity / Proxy server / Authentication

Making a Nymbler Nymble using VERBS? Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,k2henry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
89Anonymity / Graph theory / Privacy / Network theory / Graph / L-diversity / T-closeness / Bipartite graph / Data anonymization / Connectivity / Clique / Random graph

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-06 06:58:22
90Dark web / Secure communication / Internet privacy / File sharing / Cross-platform software / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Peer-to-peer / Crowds

How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
UPDATE