Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,052,302 papers from all fields of science
Search
Sign In
Create Free Account
De-anonymization
Known as:
De-anonymisation
, Deanonymisation
, Deanonymization
De-anonymization (also spelt as deanonymization) is a strategy in data mining in which anonymous data is cross-referenced with other sources of data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Data anonymization
Data mining
De-identification
Identification (information)
Expand
Broader (2)
Internet privacy
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
TwistedPair : Towards Practical Anonymity in the Bitcoin P 2 P Network
2017
Corpus ID: 53396934
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin’s networking stack. In particular, the current…
Expand
2015
2015
Geotagger: A collaborative environmental inquiry platform
J. A. Fails
,
K. Herbert
,
+8 authors
Varsha Nimbagal
International Conference on Collaboration…
2015
Corpus ID: 14753354
Geotagger is a collaborative environmental inquiry platform that enables children and adults alike the opportunity to observe the…
Expand
2014
2014
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services
George P. Corser
,
Huirong Fu
,
+4 authors
Ye Zhu
IEEE Intelligent Vehicles Symposium Proceedings
2014
Corpus ID: 17895785
Wireless networks which would connect vehicles via the Internet to a location based service, LBS, also would expose vehicles to…
Expand
2013
2013
Structural Attack to Anonymous Graph of Social Networks
Tieying Zhu
,
Shanshan Wang
,
Xiangtao Li
,
Zhiguo Zhou
,
Riming Zhang
2013
Corpus ID: 55686539
With the rapid development of social networks and its applications, the demand of publishing and sharing social network data for…
Expand
2012
2012
Attacking location privacy: exploring human strategies
Thore Fechner
,
C. Kray
Ubiquitous Computing
2012
Corpus ID: 18250635
The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led…
Expand
2011
2011
Content-Based De-anonymisation of Tweets
Tomotaka Okuno
,
Masatsugu Ichino
,
T. Kuboyama
,
Hiroshi Yoshiura
Seventh International Conference on Intelligent…
2011
Corpus ID: 7559490
Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the…
Expand
2010
2010
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching
Shui Yu
,
Theerasak Thapngam
,
Su Wei
,
Wanlei Zhou
International Conference on Algorithms and…
2010
Corpus ID: 33857754
Anonymous web browsing is a hot topic with many potential applications for privacy reasons The current dominant strategy to…
Expand
Highly Cited
2009
Highly Cited
2009
The Fog over the Grimpen Mire: Cloud Computing and the Law
M. Mowbray
2009
Corpus ID: 162319671
© The Fog over the Grimpen Mire: Cloud Computing and the Law
2004
2004
Fair traceable off-line electronic cash in wallets with observers
X. Hou
,
C. H. Tan
International Conference on Advanced…
2004
Corpus ID: 23975943
Fair tracing is an important mechanism to prevent or detect crimes in anonymous electronic cash schemes. Besides coin tracing and…
Expand
2002
2002
Offline Payments with Auditable Tracing
D. Kügler
,
Holger Vogt
Financial Cryptography
2002
Corpus ID: 5083188
Tracing is an important mechanism to prevent crimes in anonymous payment systems. However, it is also a threat to the customer's…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE