Home
/
Books
/
anonymity&circumvention
File Name
Size
Date
..
—
—
bitcoin
—
04-07-2024 16:33:29
dpi
—
04-07-2024 16:33:25
fingerprinting, correlation, & side-channel attacks
—
04-07-2024 16:33:27
ooni
—
04-07-2024 16:33:28
stylometry
—
04-07-2024 16:33:25
tor
—
26-08-2024 14:15:52
A Formal Treatment of Onion Routing (2005) - Camenisch, Lysyanskaya.pdf.gz
209.87KB
04-07-2024 16:33:29
A Graphical Framework for Representing Anonymity Metrics (2013) - Bagai.pdf.gz
275.36KB
04-07-2024 16:33:27
A New Replay Attack Against Anonymous Communication Networks (2008) - Pries, Yu, Fu, Zhao.pdf.gz
129.79KB
04-07-2024 16:33:30
A Review of Techniques to Mitigate Sybil Attacks (2012) - Balachandran, Sanyal.pdf.gz
416.03KB
04-07-2024 16:33:28
A Secure Submission System for Online Whistleblowing Platforms (2013) - Roth, Gueldenring, Rieffel, Deitrich, Ries.pdf.gz
351.51KB
04-07-2024 16:33:30
A Survey of Anonymous Communication Channels (2008) - Danezis, Diaz.pdf.gz
258.97KB
04-07-2024 16:33:28
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology (1999).pdf.gz
656.73KB
04-07-2024 16:33:29
Censorship Resistance Let a Thousand Flowers Bloom (2013) - anonymous.pdf.gz
88.25KB
04-07-2024 16:33:30
Detecting Intentional Packet Drops on the Internet via TCP IP Side Channels (2013) - Ensafi et. al.pdf.gz
325.12KB
04-07-2024 16:33:29
E-Cash Slides (from Torbutton Etherpad).pdf.gz
69.05KB
04-07-2024 16:33:27
HORNET High-Speed Onion Routing at the Network Layer (2015) - Chen, Asoni, Barrera, Danezis, Perrig.pdf.gz
394.27KB
04-07-2024 16:33:30
Hashing it out in public Common failure modes of DHT-based anonymity schemes (2008) - Tran, Hopper, Kim.pdf.gz
639.81KB
04-07-2024 16:33:29
LEAP A Next-Generation Client VPN and Encrypted Email Provider (2016) - Sparrow, Halpin, Kaneko, Pollan.pdf.gz
261.33KB
04-07-2024 16:33:29
Near-Optimal Node Blacklisting in Adversarial Networks (2012) - Dimitrakakis, Mitrokotsa.pdf.gz
195.88KB
04-07-2024 16:33:28
Nymble Blocking Misbehaving Users in Anonymizing Networks (2008) - Tsang, Kapadia, Cornelius, Smith.pdf.gz
613.43KB
04-07-2024 16:33:28
Nym Practical Pseudonymity for Anonymous Networks (2006) - Holt, Seamons.pdf.gz
252.76KB
04-07-2024 16:33:28
PAR Payment for Anonymous Routing (2013).pdf.gz
653.21KB
04-07-2024 16:33:28
Pass It On Social Networks Stymie Censors (2008) - Sovran, Libonati, Li.pdf.gz
219.46KB
04-07-2024 16:33:28
Pisces Anonymous Communication Using Social Networks (2011) - Mittal, Wright, Borisov.pdf.gz
354.76KB
04-07-2024 16:33:29
PrivEx Private Collection of Traffic Statistics for Anonymous Communication Networks (2014) - Elahi, Danezis, Goldberg.pdf.gz
954.59KB
04-07-2024 16:33:27
Privacy Preserving Cloud Data Access With Multi-Authorities (2013) - Jung, Li, Wan, Wan.pdf.gz
269.59KB
04-07-2024 16:33:28
Pseudonym Systems [thesis] (1999) - Lysyanskaya.pdf.gz
227.18KB
04-07-2024 16:33:27
Riffle An Efficient Communication System with Strong Anonymity (2016) - Kwon, Lazar, Devadas, Ford.pdf.gz
4.37MB
04-07-2024 16:33:29
Scalable and Anonymous Group Communication with MTor (2016) - Lin, Sherr, Thau Loo.pdf.gz
1.66MB
04-07-2024 16:33:27
Search Me If You Can Privacy-preserving Location Query Service (2012).pdf.gz
148.33KB
04-07-2024 16:33:28
SoK Secure Messaging (2015) - Unger, Dechand, Bonneau, Fahl, Perl, Goldberg, Smith.pdf.gz
363.94KB
04-07-2024 16:33:28
Specification of the Identity Mixer Cryptographic Library Version 2.3.0 - IBM Research Labs.pdf.gz
494.20KB
04-07-2024 16:33:29
Specification of the Identity Mixer Cryptographic Library.pdf.gz
494.17KB
04-07-2024 16:33:29
Sphinx A Compact and Provably Secure Mix Format (2008) - Danezis, Goldberg.pdf.gz
433.89KB
04-07-2024 16:33:28
Statistical Disclosure or Intersection Attacks on Anonymity Systems (2004) - Danezis, Serjantov.pdf.gz
1.06KB
04-07-2024 16:33:28
Statistical Disclosure or Intersection Attacks on Anonymity Systems (2004) - Danezis, Serjantov.ps
343.00B
04-07-2024 16:33:29
Switzerland Design (2008) - Eckersley.pdf.gz
117.48KB
04-07-2024 16:33:28
TUF Survivable Key Compromise in Software Update Systems (2010) - Samuel, Mathewson, Cappos, Dingledine.pdf.gz
219.54KB
04-07-2024 16:33:30
Using Sphinx to Improve Onion Routing Construction (2009) - Kate, Goldberg.pdf.gz
167.70KB
04-07-2024 16:33:29
Vuvuzela Scalable Private Messaging Resistant to Traffic Analysis - Zeldovich et. al.pdf.gz
302.88KB
04-07-2024 16:33:29
10" >