Anonymity application

Results: 15



#Item
1

OSA Sample Scholarship Essays Some of the following content has been altered to maintain anonymity. MSU standards for intellectual honesty apply to scholarship application essays. Essays copied in whole or in part from

Add to Reading List

Source URL: studyabroad.isp.msu.edu

Language: English - Date: 2010-09-27 09:36:02
    2Software / Reverse proxy / Free software / Computing / Anonymity / X-Forwarded-For / Web development / IP addresses / Web server / Apache HTTP Server / HAProxy / ALOHAnet

    ALOHA Load-Balancer - Application Note Get client IP in Apache HTTPD Document version: v1.1 Last update:

    Add to Reading List

    Source URL: www.haproxy.com

    Language: English - Date: 2014-04-28 06:52:23
    3Internet privacy / Network performance / Dark web / Wireless networking / Telecommunications engineering / Tor / Routing / Anonymity / Proxy server / Crowds / Anonymous remailer / Secure communication

    The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 14:55:45
    4

    Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures G. Fuchsbauer D. Pointcheval

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2009-08-23 17:17:30
      5

      A3 : An Extensible Platform for Application-Aware Anonymity Micah Sherr∗ Andrew Mao† William R. Marczak‡ Wenchao Zhou∗ Boon Thau Loo∗ Matt Blaze∗ ∗ University of Pennsylvania

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2010-07-16 14:58:27
        6Fax / Anonymity / Technology / Kasumigaseki / Toranomon /  Minato /  Tokyo

        Individual Donation Application Form To: Yoshiji NOGAMI, President, the Japan Institute of International Affairs Donation amount: __________________ yen

        Add to Reading List

        Source URL: www2.jiia.or.jp

        Language: English - Date: 2012-05-23 02:01:29
        7Commitment scheme / RSA / Group signature / Homomorphic signatures for network coding / Spectral theory of ordinary differential equations / Cryptography / Finite fields / XTR

        Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer David Pointcheval

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2008-12-17 12:32:39
        8Internet privacy / Cryptographic protocols / Communications protocol / Data transmission / Protocols / Public-key cryptography / Proxy server / Anonymity / Application layer / Cryptography / Computing / Data

        Microsoft Word - anonim_10

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-12-16 11:44:00
        9Ethics / Anonymity / Tor / Privacy / Proxy server / Anonymity application / Len Sassaman / Internet privacy / Internet / Computing

        Tor: a quick overview Roger Dingledine The Tor Project https://torproject.org/ 1

        Add to Reading List

        Source URL: freehaven.net

        Language: English - Date: 2013-01-20 19:31:56
        10Computing / Anonymity / Anonymous remailer / Onion routing / Tor / Anonymous P2P / Anonymity application / Internet privacy / Cryptography / Internet

        Exploiting hidden services to setup anonymous communication infrastructures 21 October 2006 Luxembourg

        Add to Reading List

        Source URL: www.s0ftpj.org

        Language: English - Date: 2007-01-25 14:17:15
        UPDATE