Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores privacy-preserving data publishing mechanisms, including k-anonymity and differential privacy, and their practical applications and challenges.