Privacy-enhancing technologies

Results: 201



#Item
71

Proceedings on Privacy Enhancing Technologies 2015; ):1–19 David Fifield*, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson Blocking-resistant communication through domain fronting

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English
    72

    Proceedings on Privacy Enhancing Technologies 2015; ):77–91 Vasile C. Perta*, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 , and Alessandro Mei2 A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hi

    Add to Reading List

    Source URL: www.eecs.qmul.ac.uk

    Language: English - Date: 2015-04-02 03:09:04
      73

      Privacy Enhancing Technologies for the Internet, Parts I and II Ian Goldberg, David Wagner, Eric Brewer presented by Nikita Borisov ECE598NB - Spring 2006

      Add to Reading List

      Source URL: hatswitch.org

      Language: English - Date: 2012-08-17 09:53:18
        74

        Proceedings on Privacy Enhancing Technologies 2015; ):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall Keywords: Tor, GFW, censorship analysis, network measurement, idle scan

        Add to Reading List

        Source URL: www.cs.kau.se

        Language: English - Date: 2015-04-23 20:07:04
          75Social issues / Computer law / Computing / Internet privacy / Data Protection Act / Information privacy / Government procurement in the United States / Heights Community Council / Privacy-enhancing technologies / Ethics / Privacy / Identity management

          CITICARS MEMBERSHIP PROGRAM TERMS & CONDITIONS AND PERSONAL DATA PROTECTION NOTICE CITICARS MEMBERSHIP PROGRAM TERMS & CONDITIONS AND PERSONAL DATA PROTECTION NOTICE CITICARS MEMBERSHIP PROGRAM TERMS & CONDITIONS a)

          Add to Reading List

          Source URL: citicars.com.my

          Language: English - Date: 2014-10-02 11:32:39
          76Internet privacy / Routing / Computer networking / Traceroute / Tor / Border Gateway Protocol / Hop / Proxy server / Onion routing / Computing / Internet / Network architecture

          Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

          Add to Reading List

          Source URL: www.ohmygodel.com

          Language: English - Date: 2015-05-23 12:03:44
          77Internet privacy / Cryptographic software / Anonymity / Anonymous remailer / Proxy servers / Email / Penet remailer / Pseudonymous remailer / Pseudonymity / Cryptography / Internet / Computing

          Privacy Enhancing Technologies for the Internet III: Ten Years Later∗ Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2007-12-29 13:05:17
          78Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

          Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2011-03-09 14:36:12
          79Ethology / Knowledge engineering / Information science / Technical communication / Semantic Web / Ontology / Entity-relationship model / Tor / Internet privacy / Knowledge / Knowledge representation / Science

          Proceedings on Privacy Enhancing Technologies To appear Aaron D. Jaggard*, Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum

          Add to Reading List

          Source URL: dedis.cs.yale.edu

          Language: English - Date: 2015-04-23 16:28:15
          80Ethology / Knowledge engineering / Information science / Technical communication / Semantic Web / Ontology / Entity-relationship model / Tor / Internet privacy / Knowledge / Knowledge representation / Science

          Proceedings on Privacy Enhancing Technologies To appear Aaron D. Jaggard*, Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum

          Add to Reading List

          Source URL: www.ohmygodel.com

          Language: English - Date: 2015-03-30 09:34:27
          UPDATE