Freedom and Anonymity

被引:0
|
作者
Zittrain, Jonathan [1 ]
机构
[1] Harvard Univ, Berkman Ctr Internet & Soc, Cambridge, MA 02138 USA
关键词
D O I
10.1038/scientificamerican0311-13
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
引用
收藏
页码:13 / 13
页数:1
相关论文
共 50 条
  • [21] gPHI: Lightweight Anonymity Protocol for Anonymity at Host and AS Levels
    Yoshinaka, Yutaro
    Takemasa, Junji
    Koizumi, Yuki
    Hasegawa, Toru
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [22] A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System
    Wang Liang
    Guo Yajun
    Yan Huifang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 254 - 257
  • [23] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    CYBERSECURITY, 2023, 6 (01)
  • [24] Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System
    Mulazzani, Martin
    Huber, Markus
    Weippl, Edgar R.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (05): : 539 - 546
  • [25] Discussing Anonymity Metrics for Mix Based Anonymity Approaches
    Dang Vinh Pham
    Wright, Joss
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 149 - 168
  • [26] The Causality Test of Network Technical Anonymity and Perceptive Anonymity
    Chen, Xi
    Li, Yujie
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 279 - 287
  • [27] Quantifying Graph Anonymity, Utility, and De-anonymity
    Ji, Shouling
    Du, Tianyu
    Hong, Zhen
    Wang, Ting
    Beyah, Raheem
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1745 - 1753
  • [28] (k, ε)-Anonymity: an Anonymity Model for Thwarting Similarity Attack
    Wang, Haiyuan
    Han, Jianmin
    Wang, Jiyi
    Wang, Lixia
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 332 - 337
  • [29] Tor network anonymity evaluation based on node anonymity
    Jun Cui
    Changqi Huang
    Huan Meng
    Ran Wei
    Cybersecurity, 6
  • [30] THE USES OF ANONYMITY
    不详
    NEW ENGLAND JOURNAL OF MEDICINE, 1952, 247 (07): : 269 - 269