<--- Back to Details
First PageDocument Content
Identity management / Social issues / Internet ethics / Internet privacy / Information privacy / Alan Westin / Anonymity / Telecommunications data retention / Privacy Lost / Ethics / Privacy / Human rights
Date: 2013-03-17 08:39:33
Identity management
Social issues
Internet ethics
Internet privacy
Information privacy
Alan Westin
Anonymity
Telecommunications data retention
Privacy Lost
Ethics
Privacy
Human rights

the strange return of gyges’ ring: an introduction Book II of Plato’s Republic tells the story of a Lydian shepherd who stumbles upon the ancient Ring of Gyges while minding his flock. Fiddling with the ring one day,

Add to Reading List

Source URL: iankerr.ca

Download Document from Source Website

File Size: 150,55 KB

Share Document on Facebook

Similar Documents

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

DocID: 1xVYb - View Document

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

DocID: 1xVHd - View Document

An Empirical Analysis of Anonymity in Zcash  arXiv:1805.03180v1 [cs.CR] 8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London

An Empirical Analysis of Anonymity in Zcash arXiv:1805.03180v1 [cs.CR] 8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London

DocID: 1xVEO - View Document

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

DocID: 1xVuF - View Document

An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London {georgios.kappos.16,h.yousaf,mary.maller.15,s.meiklejohn}@ucl.ac.uk  Abstract

An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn University College London {georgios.kappos.16,h.yousaf,mary.maller.15,s.meiklejohn}@ucl.ac.uk Abstract

DocID: 1xVgl - View Document