Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An inquiry into money laundering tools in the Bitcoin ecosystem
We provide a first systematic account of opportunities and limitations of anti-money
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …
Trained to accept? A field experiment on consent dialogs
A typical consent dialog was shown in 2 x 2 x 3 experimental variations to 80,000 users of
an online privacy tool. We find that polite requests and button texts pointing to a voluntary …
an online privacy tool. We find that polite requests and button texts pointing to a voluntary …
A secure submission system for online whistleblowing platforms
LNCS 7859 - A Secure Submission System for Online Whistleblowing Platforms Page 1 A
Secure Submission System for Online Whistleblowing Platforms Volker Roth1, Benjamin …
Secure Submission System for Online Whistleblowing Platforms Volker Roth1, Benjamin …
Cryptographic protocol analysis of an. on
B Westermann, R Wendolsky, L Pimenidis… - … Conference on Financial …, 2010 - Springer
This work presents a cryptographic analysis of AN. ON's anonymization protocols. We have
discovered three flaws of differing severity. The first is caused by the fact that the freshness …
discovered three flaws of differing severity. The first is caused by the fact that the freshness …
Using linkability information to attack mix-based anonymity services
S Schiffner, S Clauß - International Symposium on Privacy Enhancing …, 2009 - Springer
There exist well established models for anonymity focusing on traffic analysis, ie, analysing
properties of single messages as, eg, timing. However there is only little work done that use …
properties of single messages as, eg, timing. However there is only little work done that use …
[PDF][PDF] Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW
S Köpsell - 2010 - core.ac.uk
Da man im Internet nicht genau erkennen kann, wem man etwas schreibt, solltest du beim
Mailen oder Chatten nie deinen richtigen Namen, sondern immer einen Spitznamen …
Mailen oder Chatten nie deinen richtigen Namen, sondern immer einen Spitznamen …
Cybersecurity in the perspective of Internet traffic growth
HLM Kox - 2013 - mpra.ub.uni-muenchen.de
Private and public concern about digital security, cybercrime and data privacy is growing the
last few years. If Internet-related markets are flexible enough to cope with security concerns …
last few years. If Internet-related markets are flexible enough to cope with security concerns …
(More) Side Channels in Cloud Storage: Linking Data to Users
T Pulls - IFIP PrimeLife International Summer School on Privacy …, 2011 - Springer
Public cloud storage services are gaining in popularity and several commercial actors are
offering their services for users, however, not always with the security and privacy of their …
offering their services for users, however, not always with the security and privacy of their …
Secure logging of retained data for an anonymity service
The recently introduced legislation on data retention to aid prosecuting cyber-related crime
in Europe also affects the achievable security of systems for anonymous communication on …
in Europe also affects the achievable security of systems for anonymous communication on …
Tracking the footprints of anonymous defamation in cyberspace: A review of the law and technology
R Placid, J Wynekoop - Journal of Information Privacy and Security, 2011 - Taylor & Francis
The rise of the Internet has made anonymous defamation a reality. Tracking the footprints of
anonymous defamation in cyberspace can be difficult from a legal and technological …
anonymous defamation in cyberspace can be difficult from a legal and technological …