The passion of Bradley Manning: The story behind the Wikileaks whistleblower, 2013. ,
About the panama papers, Süddeutsche zeitung, 2016. ,
Communication theory of secrecy systems, Bell system technical journal, vol.28, issue.4, pp.656-715, 1949. ,
Everlasting security in the bounded storage model, IEEE Transactions on Information Theory, vol.48, issue.6, pp.1668-1680, 2002. ,
Time-lock puzzles and timed-release crypto, USA, Tech. Rep, 1996. ,
Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, vol.5, issue.1, pp.53-66, 1992. ,
Global cloud index: Forecast and methodology, Cisco, Tech. Rep, 2016. ,
A technical comparison of three low earth orbit satellite constellation systems to provide global broadband, International Astronautical, 2018. ,
A public randomness service, Proceedings of the International Conference on Security and Cryptography -SECRYPT, pp.434-438, 2011. ,
Net activists launch campaign to jam 'echelon', 2001. ,
Estimating search engine index size variability: a 9-year longitudinal study, Scientometrics, vol.107, issue.2, pp.839-856, 2016. ,
, Global visual networking index: Forecast and trends, 2017.
Information and entropy measurements on video sequences, 2005 5th International Conference on Information Communications Signal Processing, pp.1150-1154, 2005. ,
Global internet phenomena report, Sandvine, Tech. Rep, 2018. ,
Cam-girls: Inside the romanian sexcam industry, BBC News, 2017. ,
How many people watch porn at work will shock you, 2018. ,
NSA responds to Snowden claim that intercepted nude pics 'routinely' passed around by employees, 2014. ,
, Amazon S3 Glacier pricing (Glacier API only), 2019.
A study into the size of the world's intelligence industry, 2009. ,
Locality-sensitive hashing for finding nearest neighbors, IEEE Signal processing magazine, vol.25, issue.2, pp.128-131, 2008. ,
P-code: A new raid-6 code with optimal properties, Proceedings of the 23rd international conference on Supercomputing, pp.360-369, 2009. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
The NSA back door to NIST, Notices of the AMS, vol.61, issue.2, pp.190-209, 2013. ,
Stop texting right now and learn from the Chinese: there's a better way to message, 2015. ,
Watching porn on China's censored internet is an infinitely evolving cat-and-mouse game, 2017. ,
The Internet and Everyday Life in Indonesia: A New Moral Panic?, Journal of the Humanities and Social Sciences of Southeast Asia, vol.169, issue.1, pp.133-147, 2013. ,
Pornography consumption and nonmarital sexual behaviour in a sample of young Indonesian university students, Culture, Health & Sexuality, vol.15, issue.8, pp.981-996, 2013. ,
Efficient reconciliation and flow control for anti-entropy protocols, Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, ser. LADIS '08, pp.1-7, 2008. ,
Measuring password guessability for an entire university, Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, ser. CCS '13, pp.173-186, 2013. ,
The tangled web of password reuse, NDSS, vol.14, pp.23-26, 2014. ,
Deep tags: toward a quantitative analysis of online pornography, Porn Studies, vol.1, issue.1-2, pp.80-95, 2014. ,