|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Vincent Conitzer |
Anonymity-Proof Voting Rules. |
WINE |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Steven J. Murdoch, Robert N. M. Watson |
Metrics for Security and Performance in Low-Latency Anonymity Systems. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Jordi Nin, Javier Herranz, Vicenç Torra |
Attribute selection in multivariate microaggregation. |
PAIS |
2008 |
DBLP DOI BibTeX RDF |
statistical disclosure control, attribute selection, microaggregation |
26 | Polixeni Zacharouli, Aris Gkoulalas-Divanis, Vassilios S. Verykios |
A k-Anonymity Model for Spatio-Temporal Data. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian |
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Rafal Leszczyna |
Anonymity Architecture for Mobile Agent Systems. |
HoloMAS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shi-Jen Lin, Ding-Chyu Liu |
A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Raymond Chi-Wing Wong, Yubao Liu, Jian Yin 0001, Zhilan Huang, Ada Wai-Chee Fu, Jian Pei |
(alpha, k)-anonymity Based Privacy Preservation by Lossy Join. |
APWeb/WAIM |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Koji Chida, Osamu Shionoiri, Atsushi Kanai |
Secure Anonymous Communications with Practical Anonymity Revocation Scheme. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Matthew Edman, Fikret Sivrikaya, Bülent Yener |
A Combinatorial Approach to Measuring Anonymity. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Hung-Yu Chien |
New efficient user authentication scheme with user anonymity facilitating e-commerce applications. |
CEC/EEE |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Lisa Singh, Justin Zhan |
Measuring Topological Anonymity in Social Networks. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia |
On the anonymity and traceability of peer-to-peer VoIP calls. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Traian Marius Truta, Bindu Vinay |
Privacy Protection: p-Sensitive k-Anonymity Property. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam |
l-Diversity: Privacy Beyond k-Anonymity. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Matthew Burnside, Angelos D. Keromytis |
Low Latency Anonymity with Mix Rings. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Trust Negotiations with Customizable Anonymity. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Byungryong Kim |
Client and Server Anonymity Preserving in P2P Networks. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino |
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Dijiang Huang |
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla |
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Keon-Myung Lee, Jee-Hyong Lee 0001, Myung-Geun Chun |
Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. |
KES (1) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Emin Gün Sirer, Sharad Goel, Mark Robson, Dogan Engin |
Eluding carnivores: file sharing with strong anonymity. |
ACM SIGOPS European Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy, K. Jones |
On Providing Anonymity in Wireless Sensor Networks. |
ICPADS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Dennis Kügler |
On the Anonymity of Banknotes. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Baoliu Ye, Jingyang Zhou, Yang Zhang 0017, Jiannong Cao 0001, Daoxu Chen |
An Efficient Protocol for Peer-to-Peer File Sharing with Mutual Anonymity. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Sjouke Mauw, Jan Verschuren, Erik P. de Vink |
A Formalization of Anonymity and Onion Routing. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Michael W. David, Kouichi Sakurai |
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Marc Rennhard, Bernhard Plattner |
Practical Anonymity for the Masses with Mix-Networks. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee 0001, Hwankoo Kim, Sang-Jae Moon |
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. |
CDMA International Conference |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Dahlia Malkhi, Elan Pavlov |
Anonymity without 'Cryptography'. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
|
26 | Jan Camenisch, Anna Lysyanskaya |
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system |
26 | Adam Back, Ulf Möller, Anton Stiglic |
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
26 | John Wilson, Leonard M. Jessup |
A field experiment on GSS anonymity and group member status. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
insurance data processing, group member status, Wausau Insurance Companies, group productivity, insurance fraud, anonymous groups, equal status group members, unequal status group members, groupware, human factors, group support systems, office automation, social aspects of automation, field experiment, fraud |
25 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Anonymity, Signatures |
25 | Gavin O'Gorman, Stephen Blott |
Improving stream correlation attacks on anonymous networks. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
simulation, anonymity, latency |
25 | Jarmanjit Singh, Qing Shi, Harpreet Sandhu, Benjamin C. M. Fung |
Anonymizing location-based RFID data. |
C3S2E |
2009 |
DBLP DOI BibTeX RDF |
appendage, dummy record, suppression, privacy, anonymity |
25 | Xiaojuan Cai, Yonggen Gu |
Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
Probabilistic Applied Pi Calculus, Dinning Cryptographer Problem, Anonymity |
25 | Igor Margasinski |
A Parallelism-Based Approach to Network Anonymization. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
anonymous network architectures, privacy, anonymity, Communication system security |
25 | Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan |
Opacity generalised to transition systems. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Non-deducibility, Observable behaviour, Petri nets, Anonymity, Abstract interpretation, Labelled transition systems, Opacity |
25 | Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 |
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
adaptive anonymity, privacy, vehicular network, anonymous authentication |
25 | Yuping Hu |
A Watermarking Protocol for Piracy Tracing. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
piracy tracing, watermarking protocol, anonymity |
25 | Prateek Mittal, Nikita Borisov |
Information leaks in structured peer-to-peer anonymous communication systems. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
information leaks, peer-to-peer, anonymity, attacks |
25 | Sébastien Canard, Aline Gouget, Jacques Traoré |
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
anonymity, Electronic cash, transferability |
25 | Justin Brickell, Vitaly Shmatikov |
The cost of privacy: destruction of data-mining utility in anonymized data publishing. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity, utility |
25 | Yaron Rachlin, Katharina Probst, Rayid Ghani |
Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods. |
PinKDD |
2008 |
DBLP DOI BibTeX RDF |
Noise perturbation, privacy, anonymity, statistical disclosure control |
25 | Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang |
Protecting the Publishing Identity in Multiple Tuples. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity, Privacy preservation, Data publishing |
25 | Mingwu Zhang, Bo Yang 0003, Shenglin Zhu, Wenzheng Zhang |
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
anonymity, signcryption, ring signature, unforgeability |
25 | Chengfang Fang, Ee-Chien Chang |
Information Leakage in Optimal Anonymized and Diversified Data. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
k-anonymity and ?-diversity, Privacy-preserving, Data dissemination |
25 | Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz |
Denial of service or denial of security? |
CCS |
2007 |
DBLP DOI BibTeX RDF |
reliability, anonymity, denial of service, attacks |
25 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
25 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
25 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An Efficient Signcryption Scheme with Key Privacy. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy |
25 | Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker |
Low-resource routing attacks against tor. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
load balancing, anonymity, traffic analysis, tor |
25 | Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos |
GAS: Overloading a File Sharing Network as an Anonymizing System. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Security, Anonymity, P2P, Gnutella |
25 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
25 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
25 | Fabien Laguillaumie, Damien Vergnaud |
Time-Selective Convertible Undeniable Signatures. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security |
25 | Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan |
Opacity Generalised to Transition Systems. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
non-deducibility, non-inference, observable behaviour, Petri nets, anonymity, labelled transition systems, opacity |
25 | Mamata Jenamani, Leszek Lilien, Bharat K. Bhargava |
Anonymizing Web Services through a Club Mechanism with Economic Incentives. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
economic incentives, Prisoners' Dilemma, sequential repeated game, Web services, privacy, Anonymity |
25 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Custodian-Hiding Verifiable Encryption. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Publicly Verifiable, Anonymity, Verifiable Encryption |
25 | Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan |
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity |
25 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper |
k-anonymous message transmission. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
untraceable communication, privacy, anonymity, cryptographic protocols, multiparty computation, anonymous communication |
25 | Michael J. Freedman, Robert Tappan Morris |
Tarzan: a peer-to-peer anonymizing network layer. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
IP tunnels, cover traffic, distributed trust, peer-to-peer, anonymity, overlay networks, mix-nets |
25 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
25 | R. Sai Anand, C. E. Veni Madhavan |
An Online, Transferable E-Cash Payment System. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Double Spending, Anonymity, Fairness, Transferability, E-cash |
25 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
25 | Tomas Sander, Amnon Ta-Shma |
Auditable, Anonymous Electronic Cash Extended Abstract. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
anonymity, electronic cash |
24 | Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa |
Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity. |
Comput. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Nikhil Jha, Luca Vassio, Martino Trevisan, Emilio Leonardi, Marco Mellia |
Practical anonymization for data streams: z-anonymity and relation with k-anonymity. |
Perform. Evaluation |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Jun Cui, Changqi Huang, Huan Meng, Ran Wei |
Tor network anonymity evaluation based on node anonymity. |
Cybersecur. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Srikanth Parameswaran, Pubali Mukherjee, Rohit Valecha |
I Like My Anonymity: An Empirical Investigation of the Effect of Multidimensional Review Text and Role Anonymity on Helpfulness of Employer Reviews. |
Inf. Syst. Frontiers |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz |
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. |
NDSS |
2023 |
DBLP BibTeX RDF |
|
24 | Grant McKenzie, Hongyu Zhang |
Platial k-Anonymity: Improving Location Anonymity Through Temporal Popularity Signatures. |
GIScience |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz |
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
24 | Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa |
gPHI: Lightweight Anonymity Protocol for Anonymity at Host and AS Levels. |
IFIP Networking |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang 0006, Raheem A. Beyah |
Quantifying Graph Anonymity, Utility, and De-anonymity. |
INFOCOM |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Debajyoti Das 0001, Sebastian Meiser 0001, Esfandiar Mohammadi, Aniket Kate |
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. |
IEEE Symposium on Security and Privacy |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pol Mac Aonghusa |
(k, ε)-Anonymity: k-Anonymity with ε-Differential Privacy. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
24 | Debajyoti Das 0001, Sebastian Meiser 0001, Esfandiar Mohammadi, Aniket Kate |
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
24 | Ari Schlesinger, Eshwar Chandrasekharan, Christina A. Masden, Amy S. Bruckman, W. Keith Edwards, Rebecca E. Grinter |
Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media. |
CHI |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Jun-jie Jia, Guo-lei Yan, Li-cheng Xing |
Personalized sensitive attribute anonymity based on P - sensitive k anonymity. |
ICIIP |
2016 |
DBLP BibTeX RDF |
|
24 | Michail Tsikerdekis |
The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A Wikipedia study. |
J. Assoc. Inf. Sci. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Yifan Hao, Huiping Cao, Kabi Bhattarai, Satyajayant Misra |
STK-anonymity: k-anonymity of social networks containing both structural and textual information. |
DBSocial |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Haiyuan Wang, Jianmin Han, Jiyi Wang, Lixia Wang |
(k, ε)-Anonymity: An anonymity model for thwarting similarity attack. |
GrC |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ronny Standtke |
Pretty good anonymity: achieving high performance anonymity services with a single node architecture. |
|
2013 |
RDF |
|
24 | Matthew James Smart |
Anonymity vs. traceability : revocable anonymity in remote electronic voting protocols. |
|
2012 |
RDF |
|
24 | François Bonnet 0001, Michel Raynal |
The Price of Anonymity: Optimal Consensus Despite Asynchrony, Crash, and Anonymity. |
ACM Trans. Auton. Adapt. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Ognjen Vukovic, György Dán, Gunnar Karlsson |
On the Trade-Off between Relationship Anonymity and Communication Overhead in Anonymity Networks. |
ICC |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Mu Yang, Vladimiro Sassone |
Minimising Anonymity Loss in Anonymity Networks under DoS Attacks. |
ICICS |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Martin Mulazzani, Markus Huber 0001, Edgar R. Weippl |
Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System. |
IEEE Trans. Syst. Man Cybern. Part C |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Xuan Shang, Ke Chen 0005, Lidan Shou, Gang Chen 0001, Tianlei Hu |
(k, P)-anonymity: towards pattern-preserving anonymity of time-series data. |
CIKM |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Claudia Díaz, Steven J. Murdoch, Carmela Troncoso |
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. |
Privacy Enhancing Technologies |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Claire Vishik, Giusella Finocchiaro |
Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis. |
CSIIRW |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Dang Vinh Pham, Joss Wright |
Discussing Anonymity Metrics for Mix Based Anonymity Approaches. |
iNetSeC |
2009 |
DBLP DOI BibTeX RDF |
|
24 | François Bonnet 0001, Michel Raynal |
Brief announcement: the price of anonymity: optimal consensus despite asynchrony, crash and anonymity. |
PODC |
2009 |
DBLP DOI BibTeX RDF |
anonymous systems, distributed agreement |
24 | Claire Vishik, Giusella Finocchiaro |
Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment. |
ISSE |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Andrei Serjantov |
On the anonymity of anonymity systems. |
|
2004 |
RDF |
|
Displaying result #301 - #400 of 3902 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|