Anonymous remailer

Results: 105



#Item
1Mixminion: Design of a Type III Anonymous Remailer Protocol George Danezis University of Cambridge   Roger Dingledine

Mixminion: Design of a Type III Anonymous Remailer Protocol George Danezis University of Cambridge Roger Dingledine

Add to Reading List

Source URL: www.mixminion.net

Language: English - Date: 2006-04-09 17:22:45
    2Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

    Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-02-02 10:23:17
    3Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project   Nick Mathewson

    Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

    Add to Reading List

    Source URL: netecon.seas.harvard.edu

    Language: English - Date: 2009-11-30 14:32:00
    4Secure Encounter-based Social Networks: Requirements, Challenges, and Designs Abedelaziz Mohaisen Eugene Y. Vasserman

    Secure Encounter-based Social Networks: Requirements, Challenges, and Designs Abedelaziz Mohaisen Eugene Y. Vasserman

    Add to Reading List

    Source URL: randombits.io

    Language: English - Date: 2015-06-29 10:17:10
    5Defining	
  “Anonymity”	
  in	
  Networked	
   Communication,	
  version	
  1	
   Joan	
  Feigenbaum1	
   Technical	
  Report	
  YALEU/DCS/TR-­‐1448	
   December	
  2011	
   	
  

    Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

    Add to Reading List

    Source URL: www.cs.yale.edu

    Language: English - Date: 2012-01-20 15:00:46
    6How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

    How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

    Add to Reading List

    Source URL: www.cs.okstate.edu

    Language: English - Date: 2011-08-15 19:32:40
    7Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:57
    8PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

    PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English
    9Compulsion Resistant Anonymous Communications George Danezis and Jolyon Clulow University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom.

    Compulsion Resistant Anonymous Communications George Danezis and Jolyon Clulow University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom.

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:54
    10The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

    The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 14:55:45