Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,261,735 papers from all fields of science
Search
Sign In
Create Free Account
Degree of anonymity
In anonymity networks (e.g., Tor, Crowds, Mixmaster, Tarzan, etc.), it is important to be able to measure quantitatively the guarantee that is given…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
4 relations
Broader (1)
Internet privacy
Mix network
Tor Messenger
Universal composability
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
P. Koshy
,
Diana Koshy
,
P. Mcdaniel
Financial Cryptography
2014
Corpus ID: 225868
Over the last 4 years, Bitcoin, a decentralized P2P crypto-currency, has gained widespread attention. The ability to create…
Expand
Review
2014
Review
2014
Contextualizing cybersex experience: Heterosexually identified men and women's desire for and experiences with cybersex with three types of partners
Krystelle Shaughnessy
,
E. Byers
Comput. Hum. Behav.
2014
Corpus ID: 36864976
Highly Cited
2013
Highly Cited
2013
Elections and Deceptions: An Experimental Study on the Behavioral Effects of Democracy
L. Corazzini
,
Sebastian Kube
,
Michel André Maréchal
,
Antonio Nicoló
2013
Corpus ID: 28239322
Traditionally, the virtue of democratic elections has been seen in their role as means of screening and sanctioning shirking…
Expand
Highly Cited
2012
Highly Cited
2012
User k-anonymity for privacy preserving data mining of query logs
G. Navarro-Arribas
,
V. Torra
,
Arnau Erola
,
Jordi Castellà-Roca
Inf. Process. Manag.
2012
Corpus ID: 11308576
2010
2010
Modeling Identity-Related Properties and Their Privacy Strength
Meilof Veeningen
,
B. D. Weger
,
Nicola Zannone
Formal Aspects in Security and Trust
2010
Corpus ID: 14171751
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have…
Expand
Review
2007
Review
2007
Anonymity and Self-Disclosure on Weblogs
Hua Qian
,
C. Scott
J. Comput. Mediat. Commun.
2007
Corpus ID: 25963732
Bloggers are typically cautious about engaging in self-disclosure because of concerns that what they post may have negative…
Expand
Review
2006
Review
2006
Modeling Peer Assessment as Agent Negotiation in a Computer Supported Collaborative Learning Environment
K. Lai
,
C. Lan
J. Educ. Technol. Soc.
2006
Corpus ID: 5880533
This work presents a novel method for modeling collaborative learning as multi-issue agent negotiation using fuzzy constraints…
Expand
Highly Cited
2003
Highly Cited
2003
Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
S. Brenner
2003
Corpus ID: 54934799
This article speculates about how the organization of criminal activity may evolve in cyberspace. It begins by examining…
Expand
Highly Cited
2003
Highly Cited
2003
Managing Multiple and Dependable Identities
E. Damiani
,
S. Vimercati
,
P. Samarati
IEEE Internet Comput.
2003
Corpus ID: 10449870
Digital management of multiple robust identities is a crucial issue in developing the next generation of distributed applications…
Expand
Highly Cited
2002
Highly Cited
2002
Towards Measuring Anonymity
Claudia Díaz
,
S. Seys
,
J. Claessens
,
B. Preneel
Privacy Enhancing Technologies
2002
Corpus ID: 14311125
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE