Can Pseudonymity Really Guarantee Privacy?
暂无分享,去创建一个
[1] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[2] G. C. Tiao,et al. Inference and Disputed Authorship: The Federalist , 1966 .
[3] J. Springer. A Mechanical Solution of a Literary Problem , 1923 .
[4] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[5] S. Fienberg,et al. Inference and Disputed Authorship: The Federalist , 1966 .
[6] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[7] John Burrows,et al. Word-Patterns and Story-Shapes: The Statistical Analysis of Narrative Style , 1987 .
[8] Robert Bosch,et al. Separating Hyperplanes and the Authorship of the Disputed Federalist Papers , 1998 .
[9] A. Ellegård. A statistical method for determining authorship : the Junius letters, 1769-1772 , 1962 .
[10] C. B. Williams. Mendenhall's studies of word-length distribution in the works of Shakespeare and Bacon , 1975 .
[11] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[12] Frederick Mosteller,et al. Applied Bayesian and classical inference : the case of the Federalist papers , 1984 .
[13] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[14] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[15] A. Q. Morton. The Authorship of Greek Prose , 1965 .