Anonymity

Results: 917



#Item
181

AnoA: A Framework For Analyzing Anonymous Communication Protocols? Anonymity meets differential privacy Michael Backes1,3 , Aniket Kate2 , Praveen Manoharan3 , Sebastian Meiser3 , and Esfandiar Mohammadi3 1

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2013-06-10 12:18:23
    182Anonymity / Blogging / Blog / Pseudonymity / Ambition / Anonymous blog

    Cites & Insights: Crawford at Large

    Add to Reading List

    Source URL: www.citesandinsights.info

    Language: English - Date: 2012-08-13 22:41:17
    183Internet privacy / Computing / Privacy / Identity management / Law / Technology / Personally identifiable information / DoubleClick / HTTP cookie / Medical privacy / Anonymity / Privacy concerns with social networking services

    Privacy Policy Welcome to Sugar-Free Mom Sugar-Free Mom has created this Privacy Policy in order to set forth the principles governing our information-gathering and dissemination practices, including but not limited to s

    Add to Reading List

    Source URL: cf.sugarfreemom.com

    Language: English - Date: 2015-08-07 18:51:24
    184Language / Academic publishing / Public sphere / Academia / Publishing / Bibliography / Manuscript / Writing / Author / Citation / Copyright law of the United States / Anonymity

    REVISIONS FEBRUARY 2, 2015 Author Guidelines: Political Psychology Instructions for Contributors 1. Articles must focus on the relationship(s) between psychological and political processes, and authors should clearly art

    Add to Reading List

    Source URL: www.ispp.org

    Language: English - Date: 2015-02-02 16:51:46
    185

    Editorial Debating donor anonymity in Belgium Rights and balances Like in a number of other European countries, Belgium currently debates donor anonymity. The essence of the debate is the right of the child to know, as f

    Add to Reading List

    Source URL: www.fvvo.be

    Language: English - Date: 2015-07-10 02:46:10
      186

      Secrecy is crucial to security goals  In itself: Anonymity protocols want to keep originator identities secret. Min-Entropy as a Resource

      Add to Reading List

      Source URL: www.cs.ox.ac.uk

      Language: English - Date: 2011-10-15 07:28:45
        187Anti-corporate activism / Dissent / Labour law / Whistleblower / Workplace / Workplace bullying / Hotline / Anonymity / Department of Defense Whistleblower Program

        Whistleblower Hotline FAQ tjk mark

        Add to Reading List

        Source URL: www.americanpublicmediagroup.org

        Language: English - Date: 2016-02-08 12:40:39
        188

        Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

        Add to Reading List

        Source URL: www.privacyinternational.org

        Language: English - Date: 2015-06-18 04:03:15
          189

          Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

          Add to Reading List

          Source URL: syssec.kaist.ac.kr

          Language: English - Date: 2012-09-03 21:42:59
            190Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

            On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2006-10-10 13:39:42
            UPDATE