Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(anonymity). Showing records 1 – 30 of 288 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


George Mason University

1. Vasudevan, Abinash. An Empirical Study of an Anonymity Metric for Data Networks .

Degree: 2013, George Mason University

 Privacy and data protection are two very important needs in the modern day Internet. One of the attacks to privacy is eavesdropping, i.e., an outsider… (more)

Subjects/Keywords: anonymous networks; privacy; anonymity metric; anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vasudevan, A. (2013). An Empirical Study of an Anonymity Metric for Data Networks . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vasudevan, Abinash. “An Empirical Study of an Anonymity Metric for Data Networks .” 2013. Thesis, George Mason University. Accessed August 18, 2019. http://hdl.handle.net/1920/8497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vasudevan, Abinash. “An Empirical Study of an Anonymity Metric for Data Networks .” 2013. Web. 18 Aug 2019.

Vancouver:

Vasudevan A. An Empirical Study of an Anonymity Metric for Data Networks . [Internet] [Thesis]. George Mason University; 2013. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/1920/8497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vasudevan A. An Empirical Study of an Anonymity Metric for Data Networks . [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Missouri – Kansas City

2. Lopes, Joel, 1985-. Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing .

Degree: 2010, University of Missouri – Kansas City

 A sensor network consists of autonomous sensors that operate cooperatively to monitor sensitive information in various environments. A sensor node often sends the information to… (more)

Subjects/Keywords: Hashing anonymity; Onion ring; Receiver anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lopes, Joel, 1. (2010). Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing . (Thesis). University of Missouri – Kansas City. Retrieved from http://hdl.handle.net/10355/9605

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lopes, Joel, 1985-. “Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing .” 2010. Thesis, University of Missouri – Kansas City. Accessed August 18, 2019. http://hdl.handle.net/10355/9605.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lopes, Joel, 1985-. “Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing .” 2010. Web. 18 Aug 2019.

Vancouver:

Lopes, Joel 1. Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing . [Internet] [Thesis]. University of Missouri – Kansas City; 2010. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10355/9605.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lopes, Joel 1. Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing . [Thesis]. University of Missouri – Kansas City; 2010. Available from: http://hdl.handle.net/10355/9605

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Alberta

3. Smirnov, Kristen. Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?.

Degree: PhD, Faculty of Business, 2013, University of Alberta

 In discussions of identity in online environments, the current momentum in both academic literature and industry practices pushes toward full identity revelation. Along with market-driven… (more)

Subjects/Keywords: Internet; Pseudonyms; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smirnov, K. (2013). Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/v118rf13p

Chicago Manual of Style (16th Edition):

Smirnov, Kristen. “Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?.” 2013. Doctoral Dissertation, University of Alberta. Accessed August 18, 2019. https://era.library.ualberta.ca/files/v118rf13p.

MLA Handbook (7th Edition):

Smirnov, Kristen. “Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?.” 2013. Web. 18 Aug 2019.

Vancouver:

Smirnov K. Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?. [Internet] [Doctoral dissertation]. University of Alberta; 2013. [cited 2019 Aug 18]. Available from: https://era.library.ualberta.ca/files/v118rf13p.

Council of Science Editors:

Smirnov K. Anonymous and Pseudo-Anonymous Behaviors Online: Are Full Identities Truly Better?. [Doctoral Dissertation]. University of Alberta; 2013. Available from: https://era.library.ualberta.ca/files/v118rf13p


Texas A&M University

4. Zhu, Ye. On traffic analysis in anonymous communication networks.

Degree: 2009, Texas A&M University

 In this dissertation, we address issues related to traffic analysis attacks and the engineering in anonymous communication networks. Mixes have been used in many anonymous… (more)

Subjects/Keywords: traffic analysis; anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2009). On traffic analysis in anonymous communication networks. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-1758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Ye. “On traffic analysis in anonymous communication networks.” 2009. Thesis, Texas A&M University. Accessed August 18, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-1758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Ye. “On traffic analysis in anonymous communication networks.” 2009. Web. 18 Aug 2019.

Vancouver:

Zhu Y. On traffic analysis in anonymous communication networks. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhu Y. On traffic analysis in anonymous communication networks. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vanderbilt University

5. Podgursky, Benjamin T. Practical k-Anonymity on large datasets.

Degree: MS, Computer Science, 2011, Vanderbilt University

 The implicit contract between an individual and a website is that a viewer will remain anonymous unless they choose to identify themselves. On the other… (more)

Subjects/Keywords: clustering; anonymity; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Podgursky, B. T. (2011). Practical k-Anonymity on large datasets. (Masters Thesis). Vanderbilt University. Retrieved from http://etd.library.vanderbilt.edu/available/etd-04042011-120300/ ;

Chicago Manual of Style (16th Edition):

Podgursky, Benjamin T. “Practical k-Anonymity on large datasets.” 2011. Masters Thesis, Vanderbilt University. Accessed August 18, 2019. http://etd.library.vanderbilt.edu/available/etd-04042011-120300/ ;.

MLA Handbook (7th Edition):

Podgursky, Benjamin T. “Practical k-Anonymity on large datasets.” 2011. Web. 18 Aug 2019.

Vancouver:

Podgursky BT. Practical k-Anonymity on large datasets. [Internet] [Masters thesis]. Vanderbilt University; 2011. [cited 2019 Aug 18]. Available from: http://etd.library.vanderbilt.edu/available/etd-04042011-120300/ ;.

Council of Science Editors:

Podgursky BT. Practical k-Anonymity on large datasets. [Masters Thesis]. Vanderbilt University; 2011. Available from: http://etd.library.vanderbilt.edu/available/etd-04042011-120300/ ;


Tulane University

6. Fenske, Ellis. Anonymity and Linkability.

Degree: 2018, Tulane University

This thesis considers systems for anonymous communication between users of a cybersystem. Specifically, we consider the scenario where communications generated by the same user repeatedly… (more)

Subjects/Keywords: Anonymity; Privacy; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fenske, E. (2018). Anonymity and Linkability. (Thesis). Tulane University. Retrieved from https://digitallibrary.tulane.edu/islandora/object/tulane:79040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fenske, Ellis. “Anonymity and Linkability.” 2018. Thesis, Tulane University. Accessed August 18, 2019. https://digitallibrary.tulane.edu/islandora/object/tulane:79040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fenske, Ellis. “Anonymity and Linkability.” 2018. Web. 18 Aug 2019.

Vancouver:

Fenske E. Anonymity and Linkability. [Internet] [Thesis]. Tulane University; 2018. [cited 2019 Aug 18]. Available from: https://digitallibrary.tulane.edu/islandora/object/tulane:79040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fenske E. Anonymity and Linkability. [Thesis]. Tulane University; 2018. Available from: https://digitallibrary.tulane.edu/islandora/object/tulane:79040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mykolas Romeris University

7. Česonytė, Milda. Anonimiškumas baudžiamajame procese: teorija ir praktika.

Degree: Master, Law, 2013, Mykolas Romeris University

Liudytojų anonimiškumas - procesinė apsaugos priemonė, kurią taikant siekiama apsaugoti liudytoją nuo nusikalstamo poveikio bei gauti teisingus parodymus, minimaliai ribojant fundamentalią kaltinamojo teisę į gynybą… (more)

Subjects/Keywords: Liudytojo anonimiškumas; Nukentėjusiojo anonimiškumas; Abosliutus anonimiškumas; Dalinis anonimiškumas; Witness anonymity; Victim anonymity; Absolute anonymity; Partial/limited anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Česonytė, Milda. (2013). Anonimiškumas baudžiamajame procese: teorija ir praktika. (Masters Thesis). Mykolas Romeris University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130626_091503-70283 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Česonytė, Milda. “Anonimiškumas baudžiamajame procese: teorija ir praktika.” 2013. Masters Thesis, Mykolas Romeris University. Accessed August 18, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130626_091503-70283 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Česonytė, Milda. “Anonimiškumas baudžiamajame procese: teorija ir praktika.” 2013. Web. 18 Aug 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Česonytė, Milda. Anonimiškumas baudžiamajame procese: teorija ir praktika. [Internet] [Masters thesis]. Mykolas Romeris University; 2013. [cited 2019 Aug 18]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130626_091503-70283 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Česonytė, Milda. Anonimiškumas baudžiamajame procese: teorija ir praktika. [Masters Thesis]. Mykolas Romeris University; 2013. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130626_091503-70283 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Penn State University

8. Koshy, Diana. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.

Degree: MS, Computer Science and Engineering, 2013, Penn State University

 Over the last 4 years, Bitcoin, a decentralized P2P crypto-currency, has gained widespread attention. The ability to create pseudo-anonymous financial transactions using bitcoins has made… (more)

Subjects/Keywords: Bitcoin; CoinSeer; anonymity; deanonymization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koshy, D. (2013). An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/19859

Chicago Manual of Style (16th Edition):

Koshy, Diana. “An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.” 2013. Masters Thesis, Penn State University. Accessed August 18, 2019. https://etda.libraries.psu.edu/catalog/19859.

MLA Handbook (7th Edition):

Koshy, Diana. “An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.” 2013. Web. 18 Aug 2019.

Vancouver:

Koshy D. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. [Internet] [Masters thesis]. Penn State University; 2013. [cited 2019 Aug 18]. Available from: https://etda.libraries.psu.edu/catalog/19859.

Council of Science Editors:

Koshy D. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. [Masters Thesis]. Penn State University; 2013. Available from: https://etda.libraries.psu.edu/catalog/19859


University of Illinois – Chicago

9. Spagnuolo, Michele. BitIodine: Extracting Intelligence from the Bitcoin Network.

Degree: 2013, University of Illinois – Chicago

Anonymity in Bitcoin, a peer-to-peer, decentralized electronic currency system, is a complicated issue. While the Bitcoin technology can support strong anonymity, the current implementation is… (more)

Subjects/Keywords: Bitcoin; BitIodine; anonymity; Silk Road

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spagnuolo, M. (2013). BitIodine: Extracting Intelligence from the Bitcoin Network. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Spagnuolo, Michele. “BitIodine: Extracting Intelligence from the Bitcoin Network.” 2013. Thesis, University of Illinois – Chicago. Accessed August 18, 2019. http://hdl.handle.net/10027/10144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Spagnuolo, Michele. “BitIodine: Extracting Intelligence from the Bitcoin Network.” 2013. Web. 18 Aug 2019.

Vancouver:

Spagnuolo M. BitIodine: Extracting Intelligence from the Bitcoin Network. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10027/10144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Spagnuolo M. BitIodine: Extracting Intelligence from the Bitcoin Network. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

10. Diamond, Joseph Parker. The Effect of Modern Web Content and Caching on The Tor Onion Router.

Degree: MS, Computer Science, 2018, University of Tennessee – Knoxville

 This work evaluates Tor users' risk of de-anonymization in the presence of a network-level adversary. We evaluate the likelihood that a Tor user, who is… (more)

Subjects/Keywords: Tor; AS; Aware; Anonymity; CDN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diamond, J. P. (2018). The Effect of Modern Web Content and Caching on The Tor Onion Router. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diamond, Joseph Parker. “The Effect of Modern Web Content and Caching on The Tor Onion Router.” 2018. Thesis, University of Tennessee – Knoxville. Accessed August 18, 2019. https://trace.tennessee.edu/utk_gradthes/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diamond, Joseph Parker. “The Effect of Modern Web Content and Caching on The Tor Onion Router.” 2018. Web. 18 Aug 2019.

Vancouver:

Diamond JP. The Effect of Modern Web Content and Caching on The Tor Onion Router. [Internet] [Thesis]. University of Tennessee – Knoxville; 2018. [cited 2019 Aug 18]. Available from: https://trace.tennessee.edu/utk_gradthes/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diamond JP. The Effect of Modern Web Content and Caching on The Tor Onion Router. [Thesis]. University of Tennessee – Knoxville; 2018. Available from: https://trace.tennessee.edu/utk_gradthes/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

11. -2698-4824. Anonymity in Bitcoin and Bitmessage.

Degree: Electrical and Computer Engineering, 2018, University of Texas – Austin

 This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a… (more)

Subjects/Keywords: Anonymity; Bitcoin; Bitmessage; CoinShuffle; CoinJoin

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2698-4824. (2018). Anonymity in Bitcoin and Bitmessage. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63502

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-2698-4824. “Anonymity in Bitcoin and Bitmessage.” 2018. Thesis, University of Texas – Austin. Accessed August 18, 2019. http://hdl.handle.net/2152/63502.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-2698-4824. “Anonymity in Bitcoin and Bitmessage.” 2018. Web. 18 Aug 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2698-4824. Anonymity in Bitcoin and Bitmessage. [Internet] [Thesis]. University of Texas – Austin; 2018. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/2152/63502.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-2698-4824. Anonymity in Bitcoin and Bitmessage. [Thesis]. University of Texas – Austin; 2018. Available from: http://hdl.handle.net/2152/63502

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


Brock University

12. Chesshire, Hugo. Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? .

Degree: Department of Political Science, 2014, Brock University

 Immanuel Kant’s publicity maxim states that other-regarding actions are wrong if their maxim is not compatible with their being made public. This has the effect… (more)

Subjects/Keywords: Kant; technology; internet; communication; anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chesshire, H. (2014). Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? . (Thesis). Brock University. Retrieved from http://hdl.handle.net/10464/5275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chesshire, Hugo. “Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? .” 2014. Thesis, Brock University. Accessed August 18, 2019. http://hdl.handle.net/10464/5275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chesshire, Hugo. “Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? .” 2014. Web. 18 Aug 2019.

Vancouver:

Chesshire H. Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? . [Internet] [Thesis]. Brock University; 2014. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10464/5275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chesshire H. Online Anonymity and the Kantian Publicity Principle: Can the Internet Solve the Paradox of Tyranny? . [Thesis]. Brock University; 2014. Available from: http://hdl.handle.net/10464/5275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. FERRAZ, Felipe Silva. IDeM: an identity-driven middleware for interoperable and heterogeneous systems .

Degree: 2016, Universidade Federal de Pernambuco

 In mid-2000s, for the first time in human history, urban cities started to harbor more than half of world's population. The concept of Smart Cities… (more)

Subjects/Keywords: Privacy. Security. Anonymity. Middleware.; Privacidade. Segurança. Anonymity. Middleware.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

FERRAZ, F. S. (2016). IDeM: an identity-driven middleware for interoperable and heterogeneous systems . (Thesis). Universidade Federal de Pernambuco. Retrieved from https://repositorio.ufpe.br/handle/123456789/21048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

FERRAZ, Felipe Silva. “IDeM: an identity-driven middleware for interoperable and heterogeneous systems .” 2016. Thesis, Universidade Federal de Pernambuco. Accessed August 18, 2019. https://repositorio.ufpe.br/handle/123456789/21048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

FERRAZ, Felipe Silva. “IDeM: an identity-driven middleware for interoperable and heterogeneous systems .” 2016. Web. 18 Aug 2019.

Vancouver:

FERRAZ FS. IDeM: an identity-driven middleware for interoperable and heterogeneous systems . [Internet] [Thesis]. Universidade Federal de Pernambuco; 2016. [cited 2019 Aug 18]. Available from: https://repositorio.ufpe.br/handle/123456789/21048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

FERRAZ FS. IDeM: an identity-driven middleware for interoperable and heterogeneous systems . [Thesis]. Universidade Federal de Pernambuco; 2016. Available from: https://repositorio.ufpe.br/handle/123456789/21048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

14. Lobato, Eric Matthew. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity.

Degree: MS, 2017, University of Colorado

 The k-anonymity model has become a standard for anonymizing data. However, almost all applications of k-anonymity are used to anonymize large data sets of personally… (more)

Subjects/Keywords: k-anonymity; network security; privacy; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobato, E. M. (2017). The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/tlen_gradetds/23

Chicago Manual of Style (16th Edition):

Lobato, Eric Matthew. “The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity.” 2017. Masters Thesis, University of Colorado. Accessed August 18, 2019. http://scholar.colorado.edu/tlen_gradetds/23.

MLA Handbook (7th Edition):

Lobato, Eric Matthew. “The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity.” 2017. Web. 18 Aug 2019.

Vancouver:

Lobato EM. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity. [Internet] [Masters thesis]. University of Colorado; 2017. [cited 2019 Aug 18]. Available from: http://scholar.colorado.edu/tlen_gradetds/23.

Council of Science Editors:

Lobato EM. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen k-Anonymity. [Masters Thesis]. University of Colorado; 2017. Available from: http://scholar.colorado.edu/tlen_gradetds/23


University of Colorado

15. Nishikawa, Jared. Applications of Cryptographic Hash Functions.

Degree: PhD, Mathematics, 2016, University of Colorado

  This is a cryptography thesis, and the focus is on applications of cryptographic hash functions. Hash functions, as a cryptographic primitive, are ubiquitous in… (more)

Subjects/Keywords: security; encryption; anonymity; Computer Sciences; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nishikawa, J. (2016). Applications of Cryptographic Hash Functions. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/math_gradetds/41

Chicago Manual of Style (16th Edition):

Nishikawa, Jared. “Applications of Cryptographic Hash Functions.” 2016. Doctoral Dissertation, University of Colorado. Accessed August 18, 2019. http://scholar.colorado.edu/math_gradetds/41.

MLA Handbook (7th Edition):

Nishikawa, Jared. “Applications of Cryptographic Hash Functions.” 2016. Web. 18 Aug 2019.

Vancouver:

Nishikawa J. Applications of Cryptographic Hash Functions. [Internet] [Doctoral dissertation]. University of Colorado; 2016. [cited 2019 Aug 18]. Available from: http://scholar.colorado.edu/math_gradetds/41.

Council of Science Editors:

Nishikawa J. Applications of Cryptographic Hash Functions. [Doctoral Dissertation]. University of Colorado; 2016. Available from: http://scholar.colorado.edu/math_gradetds/41


NSYSU

16. Hsu, Jen-Chun. Anonymous Credential Scheme Supporting Active Revocation.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 With the rapid development of electronic commerce, digital credentials are used with increasing frequency. Today users employing digital credentials not only com- plete the identity… (more)

Subjects/Keywords: Revocation; Cryptography; Privacy; Anonymity; Digital Credential

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, J. (2013). Anonymous Credential Scheme Supporting Active Revocation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Thesis, NSYSU. Accessed August 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Web. 18 Aug 2019.

Vancouver:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Aug 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Gao, Han. Anonymous Fair P2P-Lending Scheme.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 P2P-Lending (P2PL) is a new kind of private lending with the feature like loan interest rate marketlized and distributed borrowers/lenders, etc. The development of lending… (more)

Subjects/Keywords: Fairness; Traceable; Electronic Contract; Proxy Signature; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, H. (2015). Anonymous Fair P2P-Lending Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Thesis, NSYSU. Accessed August 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Web. 18 Aug 2019.

Vancouver:

Gao H. Anonymous Fair P2P-Lending Scheme. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Aug 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gao H. Anonymous Fair P2P-Lending Scheme. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of California – Berkeley

18. Fanti, Giulia Cecilia. Privacy-preserving Messaging and Search: A Collaborative Approach.

Degree: Electrical Engineering & Computer Sciences, 2015, University of California – Berkeley

 In a free society, people have the right to consume and share public data without fear of retribution. However, today's technological landscape enables large-scale monitoring… (more)

Subjects/Keywords: Electrical engineering; Computer science; anonymity; communication; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fanti, G. C. (2015). Privacy-preserving Messaging and Search: A Collaborative Approach. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/2b21f3kq

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fanti, Giulia Cecilia. “Privacy-preserving Messaging and Search: A Collaborative Approach.” 2015. Thesis, University of California – Berkeley. Accessed August 18, 2019. http://www.escholarship.org/uc/item/2b21f3kq.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fanti, Giulia Cecilia. “Privacy-preserving Messaging and Search: A Collaborative Approach.” 2015. Web. 18 Aug 2019.

Vancouver:

Fanti GC. Privacy-preserving Messaging and Search: A Collaborative Approach. [Internet] [Thesis]. University of California – Berkeley; 2015. [cited 2019 Aug 18]. Available from: http://www.escholarship.org/uc/item/2b21f3kq.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fanti GC. Privacy-preserving Messaging and Search: A Collaborative Approach. [Thesis]. University of California – Berkeley; 2015. Available from: http://www.escholarship.org/uc/item/2b21f3kq

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Manchester

19. Jones, Mark. Towards Accountable Anonymity in Digital Rights Management.

Degree: 2011, University of Manchester

 Digitalisation, coupled with the distribution channels of the Internet, provides a platform for efficient digital content duplication and distribution. Some individuals have abused this opportunity,… (more)

Subjects/Keywords: Digital Rights Management; Anonymity; Accountability; Pseudonymity; Unlinkability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jones, M. (2011). Towards Accountable Anonymity in Digital Rights Management. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:118990

Chicago Manual of Style (16th Edition):

Jones, Mark. “Towards Accountable Anonymity in Digital Rights Management.” 2011. Doctoral Dissertation, University of Manchester. Accessed August 18, 2019. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:118990.

MLA Handbook (7th Edition):

Jones, Mark. “Towards Accountable Anonymity in Digital Rights Management.” 2011. Web. 18 Aug 2019.

Vancouver:

Jones M. Towards Accountable Anonymity in Digital Rights Management. [Internet] [Doctoral dissertation]. University of Manchester; 2011. [cited 2019 Aug 18]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:118990.

Council of Science Editors:

Jones M. Towards Accountable Anonymity in Digital Rights Management. [Doctoral Dissertation]. University of Manchester; 2011. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:118990


Université Catholique de Louvain

20. Crombé, Henri. Correlation attacks on the Tor network.

Degree: 2016, Université Catholique de Louvain

Internet privacy has become one of the most important concepts of our time. People are worried about the surveillance of their digital communications and are… (more)

Subjects/Keywords: Anonymity threat; correlation attacks; Tor network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crombé, H. (2016). Correlation attacks on the Tor network. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:8112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Crombé, Henri. “Correlation attacks on the Tor network.” 2016. Thesis, Université Catholique de Louvain. Accessed August 18, 2019. http://hdl.handle.net/2078.1/thesis:8112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Crombé, Henri. “Correlation attacks on the Tor network.” 2016. Web. 18 Aug 2019.

Vancouver:

Crombé H. Correlation attacks on the Tor network. [Internet] [Thesis]. Université Catholique de Louvain; 2016. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/2078.1/thesis:8112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Crombé H. Correlation attacks on the Tor network. [Thesis]. Université Catholique de Louvain; 2016. Available from: http://hdl.handle.net/2078.1/thesis:8112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rice University

21. Dinh, Thien-Nam. Monetary Tor incentives through efficient nanopayment channels.

Degree: MS, Engineering, 2018, Rice University

 Tor, the most widely used and well-studied traffic anonymization network in the world, suffers from orthogonal shortcomings in network diversity and performance. We propose to… (more)

Subjects/Keywords: Tor; cryptocurrency; Bitcoin; nanopayments; anonymity; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dinh, T. (2018). Monetary Tor incentives through efficient nanopayment channels. (Masters Thesis). Rice University. Retrieved from http://hdl.handle.net/1911/105774

Chicago Manual of Style (16th Edition):

Dinh, Thien-Nam. “Monetary Tor incentives through efficient nanopayment channels.” 2018. Masters Thesis, Rice University. Accessed August 18, 2019. http://hdl.handle.net/1911/105774.

MLA Handbook (7th Edition):

Dinh, Thien-Nam. “Monetary Tor incentives through efficient nanopayment channels.” 2018. Web. 18 Aug 2019.

Vancouver:

Dinh T. Monetary Tor incentives through efficient nanopayment channels. [Internet] [Masters thesis]. Rice University; 2018. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/1911/105774.

Council of Science Editors:

Dinh T. Monetary Tor incentives through efficient nanopayment channels. [Masters Thesis]. Rice University; 2018. Available from: http://hdl.handle.net/1911/105774


University of Waterloo

22. Mortezaei, Alireza. Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network.

Degree: 2014, University of Waterloo

 We address query-anonymity in the context of wireless sensor networks. Query-anonymity is the property that the destination of a client’s query is indistinguishable from other… (more)

Subjects/Keywords: Security; Algorithms; Query-Anonymity: Wireless Sensor Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mortezaei, A. (2014). Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/9007

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mortezaei, Alireza. “Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network.” 2014. Thesis, University of Waterloo. Accessed August 18, 2019. http://hdl.handle.net/10012/9007.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mortezaei, Alireza. “Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network.” 2014. Web. 18 Aug 2019.

Vancouver:

Mortezaei A. Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10012/9007.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mortezaei A. Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/9007

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

23. Lin, Yilun. Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data.

Degree: MA, Geography, 2015, University of Minnesota

 Previous studies reveal that, using U.S. census data, over 60% population of the U.S. could be uniquely identied with a combination of gender, zip code,… (more)

Subjects/Keywords: census; k-anonymity; privacy; spatial analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2015). Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/174807

Chicago Manual of Style (16th Edition):

Lin, Yilun. “Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data.” 2015. Masters Thesis, University of Minnesota. Accessed August 18, 2019. http://hdl.handle.net/11299/174807.

MLA Handbook (7th Edition):

Lin, Yilun. “Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data.” 2015. Web. 18 Aug 2019.

Vancouver:

Lin Y. Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data. [Internet] [Masters thesis]. University of Minnesota; 2015. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/11299/174807.

Council of Science Editors:

Lin Y. Spatial Analysis of Privacy Measured Through Individual Uniqueness Based on Simple U.S. Demographics Data. [Masters Thesis]. University of Minnesota; 2015. Available from: http://hdl.handle.net/11299/174807


University of Illinois – Urbana-Champaign

24. Gong, Xun. Timing channels in traffic analysis.

Degree: PhD, 1200, 2014, University of Illinois – Urbana-Champaign

 We study two timing channel problems abstracted from practices of network traffic analysis. The first timing channel exists in a router receiving packets from two… (more)

Subjects/Keywords: privacy and anonymity; network security; information theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gong, X. (2014). Timing channels in traffic analysis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/50541

Chicago Manual of Style (16th Edition):

Gong, Xun. “Timing channels in traffic analysis.” 2014. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed August 18, 2019. http://hdl.handle.net/2142/50541.

MLA Handbook (7th Edition):

Gong, Xun. “Timing channels in traffic analysis.” 2014. Web. 18 Aug 2019.

Vancouver:

Gong X. Timing channels in traffic analysis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2014. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/2142/50541.

Council of Science Editors:

Gong X. Timing channels in traffic analysis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2014. Available from: http://hdl.handle.net/2142/50541

25. MAC AONGHUSA, POL. Personal privacy and online systems.

Degree: School of Computer Science & Statistics. Discipline of Computer Science, 2019, Trinity College Dublin

 A significant portion of the modern internet is funded by commercial return from customised content such as advertising where user interests are learned from users'… (more)

Subjects/Keywords: Privacy Search Anonymity Security; Personal Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MAC AONGHUSA, P. (2019). Personal privacy and online systems. (Thesis). Trinity College Dublin. Retrieved from http://hdl.handle.net/2262/86116

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MAC AONGHUSA, POL. “Personal privacy and online systems.” 2019. Thesis, Trinity College Dublin. Accessed August 18, 2019. http://hdl.handle.net/2262/86116.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MAC AONGHUSA, POL. “Personal privacy and online systems.” 2019. Web. 18 Aug 2019.

Vancouver:

MAC AONGHUSA P. Personal privacy and online systems. [Internet] [Thesis]. Trinity College Dublin; 2019. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/2262/86116.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MAC AONGHUSA P. Personal privacy and online systems. [Thesis]. Trinity College Dublin; 2019. Available from: http://hdl.handle.net/2262/86116

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

26. Cortes, Sarah Lewis. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.

Degree: PhD, Information Assurance Program, 2017, Northeastern University

 Recent events continue to expose the ability and commitment of Government Intelligence Agencies (GIAs) to conduct cross-border surveillance of the Internet. These revelations have significant… (more)

Subjects/Keywords: anonymity; cybersecurity; MLAT; privacy; surveillance; Tor

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cortes, S. L. (2017). Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20262326

Chicago Manual of Style (16th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Doctoral Dissertation, Northeastern University. Accessed August 18, 2019. http://hdl.handle.net/2047/D20262326.

MLA Handbook (7th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Web. 18 Aug 2019.

Vancouver:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Internet] [Doctoral dissertation]. Northeastern University; 2017. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/2047/D20262326.

Council of Science Editors:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Doctoral Dissertation]. Northeastern University; 2017. Available from: http://hdl.handle.net/2047/D20262326

27. Poulis, Georgios. Data anonymity and truthfulness.

Degree: 2014, University of Peloponesse; Πανεπιστήμιο Πελοποννήσου

 Nowadays, the vast adoption of technology, has enabled users to share many aspects of their personal lives. Social networks, GPS-enabled smartphones and portable health sensors… (more)

Subjects/Keywords: Ανωνυμίας σε επίπεδο δεδομένων και σύνδεσης; Ανωνυμία στην κινητή τηλεφωνία; Data and connection anonymity; GSM anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Poulis, G. (2014). Data anonymity and truthfulness. (Thesis). University of Peloponesse; Πανεπιστήμιο Πελοποννήσου. Retrieved from http://hdl.handle.net/10442/hedi/37084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Poulis, Georgios. “Data anonymity and truthfulness.” 2014. Thesis, University of Peloponesse; Πανεπιστήμιο Πελοποννήσου. Accessed August 18, 2019. http://hdl.handle.net/10442/hedi/37084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Poulis, Georgios. “Data anonymity and truthfulness.” 2014. Web. 18 Aug 2019.

Vancouver:

Poulis G. Data anonymity and truthfulness. [Internet] [Thesis]. University of Peloponesse; Πανεπιστήμιο Πελοποννήσου; 2014. [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10442/hedi/37084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Poulis G. Data anonymity and truthfulness. [Thesis]. University of Peloponesse; Πανεπιστήμιο Πελοποννήσου; 2014. Available from: http://hdl.handle.net/10442/hedi/37084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. 王, 慧. 多様な視点からの意見表出を促す 非対面同期型議論システムの研究.

Degree: Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学

Supervisor:西本 一志 教授 

知識科学研究科

修士

Subjects/Keywords: group discussion; anonymity; chat system anonymity control system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

王, . (n.d.). 多様な視点からの意見表出を促す 非対面同期型議論システムの研究. (Thesis). Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10119/8062

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

王, 慧. “多様な視点からの意見表出を促す 非対面同期型議論システムの研究.” Thesis, Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Accessed August 18, 2019. http://hdl.handle.net/10119/8062.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

王, 慧. “多様な視点からの意見表出を促す 非対面同期型議論システムの研究.” Web. 18 Aug 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

王 . 多様な視点からの意見表出を促す 非対面同期型議論システムの研究. [Internet] [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; [cited 2019 Aug 18]. Available from: http://hdl.handle.net/10119/8062.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

王 . 多様な視点からの意見表出を促す 非対面同期型議論システムの研究. [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; Available from: http://hdl.handle.net/10119/8062

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Southern California

29. Khoshgozran, Jaffar. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.

Degree: PhD, Computer Science, 2010, University of Southern California

 An obvious requirement for evaluating spatial queries in Location Based Services (LBS) is that the location of the query point needs to be shared with… (more)

Subjects/Keywords: privacy; location-based services; anonymity; spatial databases; geospatial information management; anonymity; cloaking; anonymizers; social networking; encryption; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khoshgozran, J. (2010). Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226

Chicago Manual of Style (16th Edition):

Khoshgozran, Jaffar. “Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.” 2010. Doctoral Dissertation, University of Southern California. Accessed August 18, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226.

MLA Handbook (7th Edition):

Khoshgozran, Jaffar. “Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.” 2010. Web. 18 Aug 2019.

Vancouver:

Khoshgozran J. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. [Internet] [Doctoral dissertation]. University of Southern California; 2010. [cited 2019 Aug 18]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226.

Council of Science Editors:

Khoshgozran J. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. [Doctoral Dissertation]. University of Southern California; 2010. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226


University of Dayton

30. Harrison, Ashley Marie. An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact.

Degree: MA, Psychology, Clinical, 2018, University of Dayton

 Previous research suggests that cyberbullying may have a greater negative impact on victims than traditional bullying (Gilroy, 2013; Walker, Sockman, & Koehen, 2011), causing impaired… (more)

Subjects/Keywords: Psychology; Cyberbullying, Bullying, Anonymity, Frequency, Perceived Control, Anxiety, Depression

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harrison, A. M. (2018). An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1525184128335822

Chicago Manual of Style (16th Edition):

Harrison, Ashley Marie. “An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact.” 2018. Masters Thesis, University of Dayton. Accessed August 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1525184128335822.

MLA Handbook (7th Edition):

Harrison, Ashley Marie. “An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact.” 2018. Web. 18 Aug 2019.

Vancouver:

Harrison AM. An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact. [Internet] [Masters thesis]. University of Dayton; 2018. [cited 2019 Aug 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1525184128335822.

Council of Science Editors:

Harrison AM. An Investigation into Bullying and Cyberbullying: The Effects of Anonymity and Form of Bullying on Severity of Victim Impact. [Masters Thesis]. University of Dayton; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1525184128335822

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

.