Anonymizer

Results: 75



#Item
51Social issues / Internet privacy / Computing / Privacy policy / Personally identifiable information / Direct marketing / Network Advertising Initiative / Anonymizer / Ethics / Privacy / Identity management

Privacy Policy Individually Identifiable Information LiveHelpNow, Inc recognizes that the growth of online services, including Internet services, has created many privacy concerns, particularly for consumers. These conce

Add to Reading List

Source URL: www.livehelpnow.net

Language: English - Date: 2013-08-13 19:29:42
52Online chat / Internet privacy / Software / Anonymous post / Pseudonymity / Internet Relay Chat / Anonymizer / Tor / Sybil attack / Computing / Anonymity / Internet

Hang With Your Buddies to Resist Intersection Attacks David Isaac Wolinsky, Ewa Syta, and Bryan Ford Yale University {david.wolinsky,ewa.syta,bryan.ford}@yale.edu

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-08-27 00:18:21
53Computing / Anonymity / Virtual machines / Anonymizer / Hyper-V / Hardware virtualization / Google Chrome OS / Hypervisor / Anonymous web browsing / System software / Internet privacy / Software

Managing NymBoxes for Identity and Tracking Protection arXiv:1312.3665v2 [cs.OS] 5 May 2014 Abstract Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification,

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-05-06 01:40:37
54Internet / Tor / Onion routing / .onion / Traffic analysis / Transmission Control Protocol / Anonymizer / Asynchronous Transfer Mode / ANts P2P / Internet privacy / Computing / Software

USENIX Association Proceedings of the 13th USENIX Security Symposium San Diego, CA, USA August 9–13, 2004

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2004-07-27 13:37:57
55Internet privacy / Telehealth / DICOM / Analysis of Functional NeuroImages / Anonymizer / Health / Medical imaging / Medicine / Anonymity

! DATA CONTRIBUTION GUIDE Outlined below are the steps that need to be completed to successfully contribute data to INDI. The primary goal of the data preparation process is to anonymize your data prior to transferring

Add to Reading List

Source URL: fcon_1000.projects.nitrc.org

Language: English - Date: 2013-11-26 17:14:53
56Cyber-bullying / Ethics / Harassment / Hinduja Group / Social psychology / Anonymizer / Behavior / Abuse / Bullying / Computer crimes

Cyberbullying Word Find Talking to youth about Internet harassment July 2013 Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D.

Add to Reading List

Source URL: www.cyberbullying.us

Language: English - Date: 2013-10-21 11:33:13
57Computer networking / Network performance / Network architecture / Proxy server / Anonymity / Computer network security / HTTP cookie / World Wide Web / Anonymizer / Internet privacy / Computing / Internet

Hints&Tips_Cover_Graphic

Add to Reading List

Source URL: www.channel4.com

Language: English - Date: 2013-06-27 10:42:28
58Internet protocols / Network architecture / Tor / Man-in-the-middle attack / Secure Shell / Anonymizer / File Transfer Protocol / Relay / Proxy server / Internet / Computing / Internet privacy

Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

Add to Reading List

Source URL: petsymposium.org

Language: English - Date: 2014-06-27 07:04:35
59Internet / File sharing networks / Cryptographic software / Tor / Peer-to-peer / Anonymizer / Internet Relay Chat / BitTorrent / Proxy server / Internet privacy / Computing / Software

Recruiting New Tor Relays with BRAIDS Rob Jansen, Nicholas Hopper, and Yongdae Kim University of Minnesota Minneapolis, MN[removed]USA {jansen, hopper, kyd}@cs.umn.edu

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2014-08-20 20:26:24
60Computer network security / Computer networking / Network performance / Proxy server / Malware / Anonymizer / Tor / Botnet / SOCKS / Computing / Internet privacy / Internet

Trend Micro Incorporated Research Paper 2012 Russian Underground 101

Add to Reading List

Source URL: www.trendmicro.no

Language: English - Date: 2012-10-30 07:51:24
UPDATE