Anonymous P2P

Results: 58



#Item
11Recipient Anonymity in a Structured Overlay  ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Recipient Anonymity in a Structured Overlay ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2006-08-11 05:24:41
12Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-16 15:23:41
13

PDF Document

Add to Reading List

Source URL: vous-etes-ici.net

Language: English - Date: 2014-02-20 21:27:03
14Microsoft Word - 04Skopek_Article_1751-1809

Microsoft Word - 04Skopek_Article_1751-1809

Add to Reading List

Source URL: fordhamlawreview.org

Language: English - Date: 2014-03-01 16:32:09
15Anonymous Communications and Censorship Resistance Using Tor to defeat Internet surveillance Computer Laboratory Steven J. Murdoch

Anonymous Communications and Censorship Resistance Using Tor to defeat Internet surveillance Computer Laboratory Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:50
16One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-03-08 10:07:59
17A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services ∗ Chi-Yin Chow

A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services ∗ Chi-Yin Chow

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
18Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Yale University 1.

Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Yale University 1.

Add to Reading List

Source URL: bford.info

Language: English - Date: 2015-01-03 20:19:38
19T ECHN O LOGY NE W S  Anonymization Technology Takes a High Profile 	 Neal Leavitt

T ECHN O LOGY NE W S Anonymization Technology Takes a High Profile Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:03
20PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: www.cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00