Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
De-anonymisation attacks on tor: A survey
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Shining light in dark places: Understanding the Tor network
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …
anonymity service. We present observations and analysis obtained by participating in the …
[KNIHA][B] Disappearing cryptography: information hiding: steganography and watermarking
P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …
steganographic techniques. The application of said techniques facilitates message …
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
Several credential systems have been proposed in which users can authenticate to services
anonymously. Since anonymity can give users the license to misbehave, some variants …
anonymously. Since anonymity can give users the license to misbehave, some variants …
Sok: anonymous credentials
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …
maintaining privacy and have been the subject of study for many years. The interest in …
Reputation systems for anonymous networks
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …
Opportunistic sensing: Security challenges for the new paradigm
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
Derecho: privacy pools with proof-carrying disclosures
J Beal, B Fisch - Proceedings of the 2024 on ACM SIGSAC Conference …, 2024 - dl.acm.org
A privacy pool enables clients to deposit units of a cryptocurrency into a shared pool where
ownership of deposited currency is tracked via a system of cryptographically hidden records …
ownership of deposited currency is tracked via a system of cryptographically hidden records …
Nymble: Blocking misbehaving users in anonymizing networks
Anonymizing networks such as Tor allow users to access Internet services privately by using
a series of routers to hide the client's IP address from the server. The success of such …
a series of routers to hide the client's IP address from the server. The success of such …