no code implementations • 5 Mar 2021 • George Kadianakis, Theodoros Polyzos, Mike Perry, Kostas Chatzikokolakis
Online anonymity and privacy has been based on confusing the adversary by creating indistinguishable network elements.
Cryptography and Security