Sciweavers

76 search results - page 8 / 16
» Tokens for Anonymous Communications in the Internet
Sort
View
GLOBECOM
2007
IEEE
15 years 6 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
95
Voted
HICSS
2002
IEEE
114views Biometrics» more  HICSS 2002»
15 years 4 months ago
The Effects of Culture in Anonymous Negotiations: Experiment in Four Countries
Internet technologies are increasingly used in various forms of communication, including negotiations. This paper explores the cultural implications in anonymous inter- and intra-...
Gregory E. Kersten, Sabine T. Köszegi, Rudolf...
IMC
2006
ACM
15 years 5 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 6 days ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
94
Voted
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 6 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz