![]() ![]() BITMESSAGE NSA PROOF FULLQuantitative Analysis of the Full Bitcoin Transaction Graph. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. Zerocash: Decentralized Anonymous Payments from Bitcoin. Bitcoin: A Peer-to-Peer Electronic Cash System. Off-the-Record Communication, or, Why Not to Use Researchers Create First Firmware Worm That Attacks Macs. , 2015. ![]() Kovah. How Many Million BIOSes Would You Like To Infect. , 2015. Thunderstrike: EFI firmware bootkits for Apple MacBooks. Trust Computing Group. Storage Work Group Storage Security Subsystem Class: Enterprise. Storage Work Group Storage Security Subsystem Class: Opal. HORNET: High-speed Onion Routing at the Network Layer. A Distributed Anonymous Information Storage and Retrieval System. , 1999. A fully homomorphic encryption scheme (PhD Thesis). Everyday Cryptography: Table 1.1 Mapping of primitives. Wu. The SRP Authentication and Key Exchange System (RFC2945), , 2000. Everyday Cryptography: Section 1.5.3 Knowledge of the encryption algorithm. BITMESSAGE NSA PROOF HOW TOHow to exchange secrets by oblivious transfer. A guide to understanding covert channel analysis of trusted systems. Lampson. A Note on the Confinement Problem. , 2015. ![]() Everyday Cryptography: Section 1.4.5 Steganography. Disappearing Cryptography (Information Hiding: steganography and watermarking). Peer-to-Peer: Harnessing the power of Disruptive Technologies, 2001. A Network of Peers: Peer-to-Peer Model Through the History of the Internet. Computer Networks a systems approach, Fifth Edition. Morgan Kaufmann, 2012. Journal of Technology Law and Policy, 2001. The Time Has Come for Limited Liability for Operators of True Anonymity Remailers in Cyberspace: An Examination of the Possibilities and Perils. Ed Snowden taught me to smuggle secrets past incredible danger. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, pages 557–570, 2004. K-anonymity: a model for protecting privacy. Theory and Applications of Models of Computation, pages 1–19, 2008. Differential Privacy: A Survey of Results. Theoretical Computer Science, pages 189–201, 1979. The Complexity of Computing the Permanent. A Combinatorial Approach to Measuring Anonymity. Towards measuring anonymity. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), 2482, April 2002. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), 2482, April 2002. Danezis. Towards an information theoretic metric for anonymity. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Everyday Cryptography: Section 3.2.2 Cover time. Blunden. When strong encryption isn’t enough. , 2015. How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. Ethics and Information Technology, pages 1 (1), 23–35., 1999. The internet of things: who wins, who loses? /technology/2015/aug/14/internet-of-things-winners-and-losers-privacy-autonomy-capitalism, 2015. Go build us a safer Internet of Things. , 2015. Infographic: The growth of the Internet of things. , 2015. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Want to hack a car? Don’t try hacking a Tesla. ![]() Farivar. How the feds took down the Dread Pirate Roberts. , 2013. R. Mac. EBay Announces First Foray Into Bitcoin With Brain-tree Unit. , 2014. Naughton. Attempts to stay anonymous on the web will only put the NSA on your trail. , 2014. Ackerman. NSA collecting phone records of millions of Verizon customers daily. , 2013. 21 tips and tricks to stay anonymous online. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |