Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,492 papers from all fields of science
Search
Sign In
Create Free Account
Operation Onymous
Known as:
Onymous
Operation Onymous was an international law enforcement operation targeting darknet markets and other hidden services operating on the Tor network.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Agora
Bitcoin
Darknet market
Doxbin
Expand
Broader (3)
Cybercrime
Dark web
Tor Messenger
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Should the dark net be taken out?
C. Everett
Network Security
2015
Corpus ID: 33412060
2014
2014
Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
Stefan Kaufmann
Automotive - Safety & Security
2014
Corpus ID: 4856420
Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages…
Expand
2013
2013
Onymous, pseudonymous, neither or both?
H. Ford
2013
Corpus ID: 172575129
2011
2011
Номинативные процессы трансонимизации и деонимизации на базе собственных имен в современном немецком языке
Л.М. Сапожникова
2011
Corpus ID: 194038261
The article focuses on the analysis of word-formation types based on proper names in the modern German language. The author…
Expand
Highly Cited
2008
Highly Cited
2008
An Indistinguishability-Based Characterization of Anonymous Channels
A. Hevia
,
Daniele Micciancio
International Symposium on Privacy Enhancing…
2008
Corpus ID: 15638551
We revisit the problem of anonymous communication, in which users wish to send messages to each other without revealing their…
Expand
Review
2007
Review
2007
Privacy and e-commerce: a consumer-centric perspective
Rhys Smith
,
J. Shao
Electronic Commerce Research
2007
Corpus ID: 13158786
Abstract Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. It is…
Expand
2006
2006
Traceable Signature: Better Efficiency and Beyond
H. Ge
,
S. Tate
Communication Systems and Applications
2006
Corpus ID: 11331388
In recent years one of the most active research areas in applied cryptography is the study of techniques for creating a group…
Expand
2006
2006
Peer-Assessment in Web-based ePortfolios System: An Experimental Study
Youmei Wang
IEEE International Conference on Consumer…
2006
Corpus ID: 31873482
Eportfolio is used as an important tool to facilitate learning reflection and assessment in IT-infused instruction and online…
Expand
2004
2004
Maximizing system performance: using reconfigurability to monitor system communications
Lesley Shannon
,
P. Chow
Proceedings. IEEE International Conference on…
2004
Corpus ID: 17160059
Commercial FPGA companies now provide tools that allow users to implement designs comprising soft-core processors and modules of…
Expand
1997
1997
Autoregressive Condditional Duration: A New Model for. . .
R. Engle
,
Jeffrey R. Russell
1997
Corpus ID: 9738512
This paper proposes a new statistical model for the anal ysis of data which arrives at irregular intervals. The model treats the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE