Anonymity

Results: 917



#Item
331Software / Human rights / Tor / Anonymity / System software / Privacy / Internet privacy / Ethics / Cryptographic software

Current events in Tor development. Roger Dingledine The Tor Project https://torproject.org/ 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-12-29 19:21:51
332Software / Cryptographic software / Tor / Load / Covert channel / Server / CPU time / Internet privacy / Computing / System software

Covert channels and anonymity Steven J. Murdoch Computer Laboratory Security Group

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
333Internet culture / Internet vigilantism / Anonymity / Medicare / Cybercrime / Anonymous / Cyber-bullying

  BENEFICIAL  OWNERSHIP  AND   INCORPORATION  TRANSPARENCY    

Add to Reading List

Source URL: thefactcoalition.org

Language: English - Date: 2014-09-08 15:14:22
334Internet / Tor / Anonymous web browsing / Traffic analysis / Anonymity / ANts P2P / Anonymizer / Anonymous P2P / Internet privacy / Software / Computing

Anonymous Communications and Censorship Resistance Using Tor to defeat Internet surveillance Computer Laboratory Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:50
335Computing / Tor / Anonymity / Location-based service / Privacy / Anonymizer / Internet privacy / Internet / Ethics

Identifying Unsafe Routes for Network-Based Trajectory Privacy Aris Gkoulalas-Divanis∗ Vassilios S. Verykios† Abstract

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:42
336Computer law / Computing / Internet culture / Internet ethics / Digital identity / Criminal law / Legal aspects of computing / Anonymity / Identity theft / Identity / Internet / Cyberspace

Digital Identity in Cyberspace Table of Contents 53 ii Table of contents Table of Contents iii Digital Identity in Cyberspace 8

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 1998-12-18 20:00:16
337Analysis of algorithms / Parameterized complexity / Time complexity / Anonymity / Matrix / NP-complete problems / Theoretical computer science / Computational complexity theory / Applied mathematics

Preprint. To appear in Data Mining and Knowledge Discovery. DOIs10618 – Online available. The Effect of Homogeneity on the Computational Complexity of Combinatorial Data Anonymization Robert Bredere

Add to Reading List

Source URL: fpt.akt.tu-berlin.de

Language: English - Date: 2012-10-16 08:46:46
338Anonymity / Computer security / Vigilance / Safety / Public safety / Security / Crime prevention / National security

OFFICIAL INTRODUCING P.I.P.P.A – YOUR 5 POINT PERSONAL SECURITY PLAN The best way to implement your P.I.P.P.A. personal security plan is with “joined up thinking”. Your

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2015-01-28 05:50:01
339Anonymity / Computer security / Vigilance / Safety / Security / Crime prevention / National security

Your 5-point personal security plan Introducing P.I.P.P.A. The best way to implement your P.I.P.P.A. personal security plan is with ‘joined-up thinking.’ Your home, work and online lives

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2015-01-26 11:29:18
340Anonymous post / User-generated content / Internet privacy / Subpoena / Privacy / Ethics / Legal documents / Anonymity

Subpoenas and Requests for Identities of Posters What should a web publisher do when confronted with an informal request, or a subpoena, seeking the identity of a person who posted user generated content (“UGC”) on

Add to Reading List

Source URL: www.americanbusinessmedia.com

Language: English - Date: 2009-12-22 15:23:22
UPDATE