Anonymity

Results: 917



#Item
311Crime prevention / National security / Child labour / Crimes against humanity / Human trafficking / Human security / Computer security / Anonymity / Confidentiality / Security / Ethics / Crime

Entry Form – Section 1 of 3

Add to Reading List

Source URL: www.no-trafficking.org

Language: English - Date: 2012-02-04 12:00:00
312Internet privacy / Network architecture / Cryptographic software / Transmission Control Protocol / Packet switching / Packet Processing / Internet Protocol / Anonymity / Degree of anonymity / Computing / Computer networking / Internet

LAP: Lightweight Anonymity and Privacy Hsu-Chun Hsiao† Tiffany Hyun-Jin Kim† Adrian Perrig† Akira Yamada‡ §

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-04-13 16:45:42
313Geolocation / Internet / Proxy servers / Geosocial networking / Location-based service / Tracking / Privacy / Vienna U-Bahn / Anonymity / Ethics / Internet privacy / Navigation

PRIVACY-PRESERVING COMMUNICATION PROTOCOLS FOR AUTHENTICATED LOCATION-BASED SERVICES IN MOBILE NETWORKS by Qin Zhang

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-12-14 00:21:23
314

Statement On The Traditions And Social Media Adopted By The D.A. General Service Board 2011 Our Tradition Eleven states that “we need always maintain personal anonymity at the level of press, radio, and films.” This

Add to Reading List

Source URL: www.debtorsanonymous.org

- Date: 2012-02-08 23:58:46
    315Self / Consciousness / Self-consciousness / Shyness / Computer-mediated communication / Social psychology / Deindividuation / Interpersonal communication / Mind / Behavior / Ethology

    European Journal of Social Psychology Eur. J. Soc. Psychol. 31, 177±Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity ADAM N. JOINSON*

    Add to Reading List

    Source URL: elearn.jku.at

    Language: English - Date: 2008-10-15 16:17:20
    316Software / Tor / Proxy server / Arm / SOCKS / Anonymity / .onion / Onion routing / Internet privacy / Internet / Computing

    A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing1 , Steven J. Murdoch1,2 , and Roger Dingledine1 1 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2010-09-06 13:36:18
    317Social issues / Internet privacy / Privacy policy / Personally identifiable information / Anonymity / Information privacy / In re Gateway Learning Corp. / Ethics / Privacy / Identity management

    ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites1 as well as through the Moxi User Interface, Portal an

    Add to Reading List

    Source URL: www.arrisi.com

    Language: English - Date: 2014-07-05 20:20:05
    318National security / Privacy / Surveillance / Public safety / Media / Anonymity / Critical theory / Security / Crime prevention / Law enforcement

    PDF Document

    Add to Reading List

    Source URL: www.leoalmanac.org

    Language: English - Date: 2014-02-11 08:32:03
    319National security / Privacy / Surveillance / Public safety / Media / Anonymity / Critical theory / Security / Crime prevention / Law enforcement

    PDF Document

    Add to Reading List

    Source URL: www.leoalmanac.org

    Language: English - Date: 2014-02-11 08:30:49
    320National security / Privacy / Surveillance / Public safety / Media / Anonymity / Critical theory / Security / Crime prevention / Law enforcement

    PDF Document

    Add to Reading List

    Source URL: www.leoalmanac.org

    Language: English - Date: 2014-02-11 08:32:16
    UPDATE