Steven

Results: 11791



#Item
1Cryptocurrencies / Alternative currencies / Bitcoin / Economy / Money / Finance / Blockchains / Digital currencies / CoinJoin / BitPay / Ethereum / RootStock

Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2018-08-06 10:58:07
2Punched card / Computing / Unit record equipment / Tabulating machine / Herman Hollerith / IBM

“DONot Fold, Spindle or Mutilate”: A Cultural History of the Punch Card Steven Lubar One hundred years have passed since Herman Hollerith invented the punch card to tabulate the 1890census. That’s also, almost exac

Add to Reading List

Source URL: www.cs.mun.ca

Language: English - Date: 2015-02-13 09:25:02
3Computer security / Computing / World Wide Web / Hacking / Transport Layer Security / Ajax / Hypertext Transfer Protocol / Cross-origin resource sharing / Content Security Policy / HTTP cookie / Same-origin policy / HTTP Strict Transport Security

Raising the Bar: Evaluating Origin-wide Security Manifests Steven Van Acker Daniel Hausknecht Andrei Sabelfeld

Add to Reading List

Source URL: danielhausknecht.eu

Language: English - Date: 2018-09-22 05:15:36
4Social information processing / Digital media / Mass media / World Wide Web / Wikipedia / Wikis / MediaWiki / Wiki

Etiquette in Wikipedia: Weening New Editors into Productive Ones Ryan Faulkner Steven Walling

Add to Reading List

Source URL: www.opensym.org

Language: English - Date: 2012-08-27 18:09:26
5Compagnies Rpublicaines de Scurit / National Police

SoK: Making Sense of Censorship Resistance Systems That CRS SoK paper at PETS Sheharbano Khattak1, Tariq Elahi2, Laurent Simon1, Colleen M. Swanson3, Steven J. Murdoch4, Ian Goldberg5 1: University of Cambridge, 2: KU Le

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:33
6Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
7

Do You See What I See? Differential Treatment of Anonymous Users Sheharbano Khattak? , David Fifield† , Sadia Afroz† , Mobin Javed† Srikanth Sundaresan‡ , Vern Paxson‡† , Steven J. Murdoch- , Damon McCoy‡ o

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:26
    8Computing / Mathematics / Mathematical software / Routing / Internet architecture / Emerging technologies / Network architecture / Load balancing / Open Shortest Path First / Computer network / Solver / Network topology

    REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗ Universite catholique de Louvain, † University College London

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-10-24 20:49:21
    9Internet privacy / Internet censorship / Computing / Digital rights / Information and communications technology / Internet security / Firewall software / Great Firewall / Proxy server / Deep packet inspection / Censorship / DNS hijacking

    Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

    Add to Reading List

    Source URL: sheharbano.com

    Language: English - Date: 2017-02-16 07:58:22
    10Cryptography / Public-key cryptography / Digital signature / Ring signature / Group signature / Pseudorandom function family / Commitment scheme / Random oracle / Secure multi-party computation

    ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger Johns Hopkins University Steven Myers

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-07-06 21:10:31
    UPDATE