作者: jabber 時間: 2025-3-21 23:26 作者: vocation 時間: 2025-3-22 03:31 作者: Initial 時間: 2025-3-22 06:37 作者: 包庇 時間: 2025-3-22 09:48 作者: jealousy 時間: 2025-3-22 15:06 作者: jealousy 時間: 2025-3-22 18:10 作者: MILL 時間: 2025-3-22 22:59 作者: Longitude 時間: 2025-3-23 05:13
ontext of Circular Constructionp of an anonymous-communication network. First, we will develop some basic approaches to realize identity management, and we will introduce the Platform for Privacy Preferences Project (P3P) as a standard for exchanging personal data in the World Wide Web. After discussing the feasibility of using P作者: INERT 時間: 2025-3-23 07:51
Exploring Docker Networking Featuresdit data to detect violations of security policy, we can balance above requirements by pseudonymization of audit data, as a form of reversible anonymization. We discuss previous work in this area and underlying trust models. Instead of relying on mechanisms external to the system, or under the contr作者: 鋼盔 時間: 2025-3-23 11:42 作者: auxiliary 時間: 2025-3-23 16:45 作者: Agnosia 時間: 2025-3-23 21:48 作者: Deadpan 時間: 2025-3-24 00:20
Towards an Analysis of Onion Routing SecurityThis paper presents a security analysis of Onion Routing, an application independent infrastructure for traffic-analysis-resistant and anonymous Internet connections. It also includes an overview of the current system design, definitions of security goals and new adversary models.作者: 補(bǔ)角 時間: 2025-3-24 04:53
Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the ElectroIn the coming years, electronic commerce (E-commerce) and electronic government (E-government) will become more and more part of citizens’ every day life. Many transactions will be performed by means of computers and computer networks. However, several hurdles have to be taken before E-commerce and E-government can develop its full potential.作者: Mammal 時間: 2025-3-24 07:03 作者: 責(zé)怪 時間: 2025-3-24 13:21
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problemser research. As we are mostly interested in efficient and practical Internet based protocols, most of the emphasis is placed on mix based constructions. The presentation is informal in that no complex definitions and proofs are presented, the aim being more to give a thorough introduction than to present deep new insights.作者: 培養(yǎng) 時間: 2025-3-24 15:34 作者: deadlock 時間: 2025-3-24 22:51 作者: LEVER 時間: 2025-3-25 03:02 作者: Certainty 時間: 2025-3-25 03:57 作者: 多山 時間: 2025-3-25 08:23 作者: Antecedent 時間: 2025-3-25 12:31 作者: 忍耐 時間: 2025-3-25 18:09
978-3-540-41724-8Springer-Verlag Berlin Heidelberg 2001作者: 古董 時間: 2025-3-25 21:35 作者: Keshan-disease 時間: 2025-3-26 01:42 作者: 邊緣帶來墨水 時間: 2025-3-26 07:27
Freenet: A Distributed Anonymous Information Storage and Retrieval Systems no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and dificult for a node operator to determine or be held responsible for the actual physical contents of her own node.作者: 格言 時間: 2025-3-26 08:34 作者: thalamus 時間: 2025-3-26 13:45 作者: Digitalis 時間: 2025-3-26 20:15 作者: 一加就噴出 時間: 2025-3-26 23:20 作者: 矛盾心理 時間: 2025-3-27 01:23 作者: DAFT 時間: 2025-3-27 05:41 作者: Arbitrary 時間: 2025-3-27 11:18
The Disadvantages of Free MIX Routes and How to Overcome Themional attacks are possible in networks with freely chosen MIX routes. After describing these attacks, we estimate their impact on the achievable degree of anonymity. Finally, we evaluate the relevance of the described attacks with respect to existing systems like e.g. Mixmaster, Crowds, and Freedom.作者: Incompetent 時間: 2025-3-27 16:38 作者: 性學(xué)院 時間: 2025-3-27 19:03 作者: 箴言 時間: 2025-3-27 22:58 作者: GREEN 時間: 2025-3-28 03:46
The Free Haven Project: Distributed Anonymous Storage Serviceed. Our design ensures the availability of each document for a publisher-specified lifetime. A reputation system provides server accountability by limiting the damage caused from misbehaving servers. We identify attacks and defenses against anonymous storage services, and close with a list of problems which are currently unsolved.作者: 一條卷發(fā) 時間: 2025-3-28 08:02
Variation and Optimization of Shapeional attacks are possible in networks with freely chosen MIX routes. After describing these attacks, we estimate their impact on the achievable degree of anonymity. Finally, we evaluate the relevance of the described attacks with respect to existing systems like e.g. Mixmaster, Crowds, and Freedom.作者: Bravado 時間: 2025-3-28 12:51
Exploring Docker Networking Featuresol of potential adversaries, in our proposal we technically bind reidentification to a threshold, representing the legal purpose of accountability in the presence of policy violations. Also, we contrast our notion of threshold-based identity recovery with previous approaches and point out open problems.作者: Indent 時間: 2025-3-28 18:03