Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Anonymity'
Anonymity published presentations and documents on DocSlides.
Internet Anonymity
by mitsue-stanley
By . Esra. . Erdin. Introduction. Types of Anony...
Towards efficient traffic-analysis resistant anonymity netw
by myesha-ticknor
Stevens Le Blond . David . Choffnes. . Wenxu...
Analysis of Trust metrics in various Anonymity Networks
by myesha-ticknor
-. Ayushi Jain & . ankur. . sachdeva. Motiva...
Increasing Anonymity via Dummy
by lois-ondreau
Jondos . in . a. Crowd. Author: Benjamin Winning...
Anonymity-preserving Public-Key Encryption
by pamella-moone
Markulf Kohlweiss. Ueli. Maurer, . Cristina . On...
Conscript Your Friends into Larger Anonymity Sets with Java
by liane-varnes
ACM Workshop on Privacy in the Electronic Society...
Anonymity-preserving Public-Key Encryption
by trish-goza
Markulf Kohlweiss. Ueli. Maurer, . Cristina . On...
K-Anonymity & Algorithms
by pamella-moone
CompSci. 590.03. Instructor: . Ashwin. . Machan...
DHCP Anonymity Profile Update
by pasty-toler
https://datatracker.ietf.org/doc/draft-ietf-dhc-a...
Anonymity, Unlinkability,
by myesha-ticknor
Undetectability. , . Unobservability. , Pseudonym...
Do Bitcoin Users Really Care About Anonymity?
by min-jolicoeur
- . An Analysis of the Bitcoin Transaction Graph....
CS 4700 / CS 5700
by pasty-toler
Network Fundamentals. Lecture 22: Anonymous Commu...
Anonymous communications: High latency systems
by min-jolicoeur
Anonymous email and messaging and their traffic a...
Anonymity in Driving Behavior
by celsa-spraggs
Shawn Bray, Zehna Gilliam and Skye Simonelli. San...
Dissent in Numbers: Making Strong Anonymity Scale
by olivia-moreira
David Wolinsky. 1. , Henry Corrigan-Gibbs. 1. , B...
“White Hat Anonymity”: Current challenges security rese
by liane-varnes
Christopher R. Barber, CISSP, C|EHv7. Threat Anal...
Preserving Caller Anonymity in
by test
Voice-over-IP . Networks. Mudhakar Srivatsa, Ling...
Self-Organized
by pasty-toler
Anonymous . Authentication . in . Mobile Ad Hoc N...
Analyzing Anonymity Protocols
by luanne-stotts
Analyzing onion-routing security. Anonymity Analy...
First Amendment Issues: Anonymity & Encryption
by danika-pritchard
CJ341 – Cyberlaw & Cybercrime. Lecture . #2...
Ways to reduce the risks
by trish-goza
of Crowds and further study of web anonymity. By:...
Secure Communication
by faustina-dinatale
A View From The Transport Layer. MANET and WSN. 1...
Increasing Anonymity in Crowds via Dummy Jondos
by sherrill-nordquist
By: Benjamin Winninger. Introduction and Problem ...
Anonymous Storage and Retrieval of Information
by tatiana-dople
Olufemi Odegbile. Motivation. Client-Server . mod...
Candidacy Exam
by phoebe-click
Topic: Privacy in Location Based Services. Wonsan...
Anonymity, Design, and Identification:
by briana-ranney
The Rhetorical Construction of Identity on Digita...
CS 4740
by briana-ranney
/ CS . 6740. Network . Security. Lecture 11: . An...
Privacy Through Anonymous Connection and Browsing
by debby-jeon
By: . Abdelhamid. Elgzil. Advisor: Dr. Chow. Out...
CS 3700
by alexa-scheidler
Networks and Distributed Systems. Anonymous . Com...
Anonymous Communication
by alida-meadow
COS 518: . Advanced Computer Systems. Lecture . 1...
CS 4700 / CS 5700 Network Fundamentals
by olivia-moreira
Lecture 22: Anonymous Communications. (Wave Hi to...
History of popular issues and topics in Alcoholics Anonymous
by yoshiko-marsland
Actions taken by the General Service Conference. ...
CS 4593/6463 – Bitcoins and Cryptocurrencies
by celsa-spraggs
Note: most of the slides used in this course are ...
CS898AT – Bitcoins and Cryptocurrencies
by karlyn-bohler
Note: most of the slides used in this course are ...
Increasing Anonymity in Crowds via Dummy Jondos By: Benjamin Winninger
by conchita-marotz
Increasing Anonymity in Crowds via Dummy Jondos B...
Data & Query Anonymization
by jade
George Danezis (. g.danezis@ucl.ac.uk. ). With hel...
Community-enhanced De -
by paige
anonymization. of . Online . Social Networks. Shi...
Slide <number> A simple metric for utility of enhanced privacy design in .11 frames
by dandy
Date:. 2023-02-13. . Authors:. Amelia Andersdott...
Information Hiding: Anonymous Communication
by singh
Amir . Houmansadr. CS660: Advanced Information Ass...
Diversity Privacy Beyond Anonymity Ashwin Machanavajjhala Johannes Gehrke Daniel Kifer Muthuramakrishnan Venkitasubramaniam Department of Computer Science Cornell University mvnak johannes dkifer vmut
by luanne-stotts
cornelledu Abstract Publishing data about individu...
Load More...