Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP 2012 1.
Owade
Privacy preserving delegated access control in public cloud
SecureCall - red phone for everyone (EN)
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification.
173519935 NSA Research Paper on Tor Network 2006
Tarzan: A Peer-to-peer Anonymizing Network Layer by Michael J.Freedman, Robert Morris
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
Performance Modeling of Anonymity Protocols
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.