Back to Results
First PageMeta Content
Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network


On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA
Add to Reading List

Document Date: 2006-10-10 13:39:42


Open Document

File Size: 1,08 MB

Share Result on Facebook