Skip to search formSkip to main contentSkip to account menu

De-anonymization

Known as: De-anonymisation, Deanonymisation, Deanonymization 
De-anonymization (also spelt as deanonymization) is a strategy in data mining in which anonymous data is cross-referenced with other sources of data… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
  • Corpus ID: 53396934
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin’s networking stack. In particular, the current… 
Review
2017
Review
2017
  • P. DeSandip Dey
  • 2017
  • Corpus ID: 33410491
Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence… 
2013
2013
The main objective of the Nymble system is to allow its users a responsible, secured anonymous online access to other networks… 
2012
2012
The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led… 
2012
2012
Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal… 
2011
2011
Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the… 
2010
2010
Anonymous web browsing is a hot topic with many potential applications for privacy reasons The current dominant strategy to… 
Highly Cited
2009
Highly Cited
2009
© The Fog over the Grimpen Mire: Cloud Computing and the Law 
2008
2008
The E-cash schemes that are revocable anonymous with the help of trusted third party (TTP) cause additional costs and the level… 
2002
2002
Tracing is an important mechanism to prevent crimes in anonymous payment systems. However, it is also a threat to the customer's…