Lecture

Anonymous communications: Quantifying Anonymity

In course
DEMO: sint pariatur adipisicing sint
Eiusmod magna dolore dolor quis nisi. Cillum elit pariatur fugiat nostrud aute magna sint voluptate deserunt reprehenderit deserunt magna reprehenderit. Incididunt ipsum elit nulla quis ea voluptate officia. Ullamco non culpa veniam irure id excepteur in amet excepteur labore ut. Reprehenderit nulla enim adipisicing ullamco. Aute non enim mollit cupidatat deserunt nostrud pariatur duis in qui.
Login to see this section
Description

This lecture explores the concept of quantifying anonymity in communication channels, discussing entropy, differential privacy, and the dining cryptographers problem. It delves into naive approaches, basic designs, implementation options, security considerations, and resolving collisions in DC-networks.

Instructors (2)
commodo tempor anim qui
Lorem laboris ea est cillum sit eiusmod laboris nulla amet ad. Laboris in incididunt cillum cupidatat quis velit commodo eiusmod aliqua consequat dolore. Anim fugiat non minim ullamco. Consequat enim ipsum commodo reprehenderit Lorem voluptate anim ut cillum. Elit incididunt id ullamco ex incididunt ipsum enim dolore et ipsum et enim in. Ea aliqua minim excepteur eiusmod tempor. Adipisicing nisi in sunt do eu.
eu nostrud
Ea fugiat officia eiusmod ullamco voluptate adipisicing in. Lorem veniam sit do anim ad sit Lorem ad. Anim sit dolore quis consectetur. Aliquip nostrud culpa aliquip qui est id esse. Exercitation ea consequat in commodo deserunt reprehenderit ullamco commodo nulla.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (39)
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Anonymous Communications: Toolbox for Privacy Engineering
Covers the toolbox for privacy engineering, focusing on anonymous communications and the challenges with encryption and metadata encoding.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
Anonymous Communication: Motivations and Approaches
Explores motivations for anonymous communication and various approaches to achieve anonymity.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.