Anonymity

Results: 917



#Item
211Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

Add to Reading List

Source URL: hrp.law.harvard.edu

Language: English - Date: 2015-06-16 21:46:00
212Financial regulation / Legal entities / Types of business entity / Money laundering / Tax evasion / Corporation / Anonymous / Bank fraud / Anonymity / Cybercrime / Law / Business

Anonymous U.S. “Shell” Corporations: A National Security Code Red The problem: American and foreign terrorists, narco-traffickers, arms dealers, corrupt foreign officials, tax evaders and other criminals easily and r

Add to Reading List

Source URL: www.tjn-usa.org

Language: English - Date: 2011-07-27 14:36:53
213Ethics / Privacy / Identity management / Social issues / HTTP cookie / Anonymous web browsing / Personally identifiable information / Anonymity / Email / Internet privacy / Computing / Internet

Privacy Policy GoBeyondTheCover/Dermablend has adopted this Privacy Statement in order to inform you of its policies with respect to information collected from this website. Your use of this website constitutes your acce

Add to Reading List

Source URL: gobeyondthecover.com

Language: English - Date: 2011-10-11 12:22:28
214Ethics / Data management / Mathematical notation / Tuple / Type theory / Relation / Anonymity / Data mining / Finitary relation / Mathematics / Relational model / Data

The VLDB Journal manuscript No. (will be inserted by the editor) Providing k-Anonymity in Data Mining? Arik Friedman, Ran Wolff, Assaf Schuster Technion – Israel Institute of Technology

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2006-09-27 11:51:39
215

Poster: COGS — Strengthening Anonymity in Tor with Guard Patience Tariq Elahi, PhD Student Kevin Bauer, Post Doctoral Fellow Mashael AlSabah, PhD Student Ian Goldberg, Associate Professor

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2012-05-15 22:37:11
    216

    Anonymity With Tor The Onion Router Nathan S. Evans Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    - Date: 2013-04-16 18:17:21
      217

      EuroScientist - European science conversation by the community, for the community www.euroscientist.com Reviewer anonymity: a hindrance to self-correction in science?

      Add to Reading List

      Source URL: 21ax0w3am0j23cz0qd1q1n3u.wpengine.netdna-cdn.com

      - Date: 2015-04-28 10:32:27
        218

        Anonymity and Censorship Resistance Entry node Middle node Exit node

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        - Date: 2010-11-22 05:24:37
          219

          Anonymity Christian Grothoff Anonymity Christian Grothoff

          Add to Reading List

          Source URL: grothoff.org

          Language: English - Date: 2011-07-13 17:46:21
            220

            Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

            Add to Reading List

            Source URL: grothoff.org

            Language: English - Date: 2013-04-23 19:02:36
              UPDATE