Back to Results
First PageMeta Content
Internet privacy / Distributed data storage / Cross-platform software / File sharing networks / Freenet / Peer-to-peer / ANts P2P / Tor / Pastry / Software / Computing / System software


Eluding Carnivores: File Sharing with Strong Anonymity Emin G¨un Sirer, Sharad Goel, Mark Robson, Doˇgan Engin Dept. of Computer Science, Cornell University August 1, 2004 Abstract
Add to Reading List

Document Date: 2004-09-17 01:06:27


Open Document

File Size: 73,04 KB

Share Result on Facebook

City

Washington / D.C. / Heidelberg / Oakland / Boston / /

Country

Germany / /

Currency

pence / /

Facility

Cornell University / port Gnutella / /

IndustryTerm

Source rewriting systems / overlay networks / anonymous communication protocols / encryption protocols / censor communications / reservation protocol / cryptographer networks / Internet routers / Web Transactions / largescale peer-to-peer applications / broadcast network / email pseudonym server / source-rewriting systems / anonymous systems / overlay network / lowerlayer protocol / online activity / secure processing / /

Organization

Cornell University / /

Person

Mark Robson / Bob / Charlie / Sharad Goel / Alice / /

/

Position

mediator / perthe mediator / /

ProgrammingLanguage

Java / C / /

ProvinceOrState

British Columbia / California / Massachusetts / /

PublishedMedium

Journal of Cryptology / /

Technology

Ethernet / 6 150 Broadcast protocols / anonymous communication protocols / file sharing system / public key / Internet routers / Java / DC-net protocol / clique-level DC-net protocol / peer-to-peer / encryption protocols / File Sharing / lower layer Herbivore protocol / private key / reservation protocol / lowerlayer protocol / SSL / GUI / /

URL

http /

SocialTag