Degree of anonymity

Results: 47



#Item
31Internet / Computing / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Tor / Troll / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-22 03:48:58
32Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:17:06
33Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Tor / Public-key cryptography / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:03:04
34Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Anonymous P2P / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:15:52
35Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-09 03:55:01
36Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:25:56
37Software / Cryptographic software / File sharing networks / File sharing / Distributed data storage / Degree of anonymity / Aardvark / Tor / Anonymous remailer / Internet privacy / Computing / Cryptography

Pythia: A Privacy Aware, Peer-to-Peer Network for Social Search Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia School of Informatics and Computing Indiana University Bloomington Bloomington, IN 47401, USA

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2011-08-31 14:53:45
38Information theory / Thermodynamics / Identity management / Social issues / Philosophy of thermal and statistical physics / Entropy / Privacy / Degree of anonymity / Principle of maximum entropy / Statistical theory / Statistics / Probability and statistics

A location privacy metric for V2X communication systems Zhendong Ma, Frank Kargl, and Michael Weber Institute of Media Informatics, Ulm University, Germany {zhendong.ma|frank.kargl|michael.weber}@uni-ulm.de Abstract—Th

Add to Reading List

Source URL: www.uni-ulm.de

Language: English - Date: 2009-04-06 08:29:12
39Computing / Internet / Degree of anonymity / Ciphertext indistinguishability / Anonymity / Onion routing / Tor / Differential privacy / Adversary model / Internet privacy / Cryptography / Cryptographic software

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-14 06:53:59
40Concurrent computing / Chord / Freenet / Distributed hash table / Crowds / Peer-to-peer / Degree of anonymity / Cache / Consistent hashing / Distributed data storage / Software / Computing

Information Leak in the Chord Lookup Protocol Charles W. O’Donnell and Vinod Vaikuntanathan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA {cwo,vinodv}@mit.edu Abstract

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:27:55
UPDATE