![Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network](https://www.pdfsearch.io/img/83b35c22f2d5a4db6b81a2a2b789cea8.jpg) Date: 2006-10-10 13:39:42Cryptography Computing Secure communication Software Cryptographic software Internet privacy Crypto-anarchism Anonymity Dining cryptographers problem Public-key cryptography K-anonymity Mix network | | On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSAAdd to Reading ListSource URL: www-users.cs.umn.eduDownload Document from Source Website File Size: 1,08 MBShare Document on Facebook
|