Anonymous P2P

Results: 58



#Item
11Internet privacy / Concurrent computing / Distributed hash table / Tapestry / Anonymous P2P / Peer-to-peer / Chord / Pastry / Routing / Distributed data storage / Computing / Software

Recipient Anonymity in a Structured Overlay ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2006-08-11 05:24:41
12Concurrent computing / Cross-platform software / Freenet / Peer-to-peer / Routing / Chord / Overlay network / Distributed hash table / Anonymous P2P / Software / Computing / Distributed data storage

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-16 15:23:41
13Internet / Anonymity / Privacy / Human rights / Tor / Information privacy / Anonymous / Telecommunications data retention / Anonymous P2P / Ethics / Internet privacy / Computing

PDF Document

Add to Reading List

Source URL: vous-etes-ici.net

Language: English - Date: 2014-02-20 21:27:03
14Anonymity / Pseudonymity / Tor / Sperm donation / Arm / Privacy / Personally identifiable information / Anonymous P2P / Cryptography / Internet privacy / Ethics

Microsoft Word - 04Skopek_Article_1751-1809

Add to Reading List

Source URL: fordhamlawreview.org

Language: English - Date: 2014-03-01 16:32:09
15Internet / Tor / Anonymous web browsing / Traffic analysis / Anonymity / ANts P2P / Anonymizer / Anonymous P2P / Internet privacy / Software / Computing

Anonymous Communications and Censorship Resistance Using Tor to defeat Internet surveillance Computer Laboratory Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:50
16File sharing / Tor / Comparison of BitTorrent clients / Magnet URI scheme / Peer exchange / Peer-to-peer / The Pirate Bay / Distributed hash table / Anonymous P2P / BitTorrent / Software / Computing

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-03-08 10:07:59
17Internet / Internet privacy / Peer-to-peer / Tor / ANts P2P / Distributed computing / Internet Relay Chat / Privacy in file sharing networks / Computing / File sharing networks / Software

A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services ∗ Chi-Yin Chow

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
18Internet / Tor / Onion routing / Anonymous remailer / Proxy server / Traffic analysis / Mixminion / Anonymity / ANts P2P / Internet privacy / Computing / Software

Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Yale University 1.

Add to Reading List

Source URL: bford.info

Language: English - Date: 2015-01-03 20:19:38
19Software / Anonymizer / Proxy server / Java Anon Proxy / Open proxy / Tor / SOCKS / Anonymous remailer / ANts P2P / Internet privacy / Computing / Internet

T ECHN O LOGY NE W S Anonymization Technology Takes a High Profile Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:03
20Computing / Onion routing / Tor / Bitcoin / Public-key cryptography / ANts P2P / Traffic analysis / Cryptography / Software / Internet privacy

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: www.cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00
UPDATE