<--- Back to Details
First PageDocument Content
Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity
Date: 2006-02-20 03:57:33
Cryptographic software
Pseudonymity
Tor
Privacy-enhancing technologies
Cryptography
Internet privacy
Anonymity

Microsoft Word - Anon_Terminology_v0.27.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Download Document from Source Website

File Size: 755,64 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Alternative currencies / Bitcoin / Economy / Money / Finance / Blockchains / Digital currencies / CoinJoin / BitPay / Ethereum / RootStock

Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu

DocID: 1xVTb - View Document

Biology / Genetics / Genomics / Molecular biology / Biotechnology / DNA / Bioinformatics / Whole genome sequencing / Genome-wide association study / Single-nucleotide polymorphism / Human genome / Privacy

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective∗ Alexandros Mittos1 , Bradley Malin2 , Emiliano De Cristofaro1 arXiv:1712.02193v2 [cs.CR] 17 Aug 2018

DocID: 1xVkE - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

DocID: 1xURB - View Document

Internet privacy / Internet censorship / Computing / Digital rights / Information and communications technology / Internet security / Firewall software / Great Firewall / Proxy server / Deep packet inspection / Censorship / DNS hijacking

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

DocID: 1xUDj - View Document

Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

DocID: 1xUB6 - View Document