Anonymity

Results: 917



#Item
341Matrix / Heuristic function / Euclidean vector / Greedy algorithm / Algebra / Mathematics / Linear algebra

Pattern-Guided k-Anonymity Robert Bredereck? , André Nichterlein, and Rolf Niedermeier Institut für Softwaretechnik und Theoretische Informatik, TU Berlin, Berlin, Germany {robert.bredereck,andre.nichterlein,rolf.niede

Add to Reading List

Source URL: fpt.akt.tu-berlin.de

Language: English - Date: 2013-04-15 08:20:00
342Privacy / Software / Cryptographic software / Tor / Anonymity / Serious Organised Crime Agency / Surveillance / Ethics / Internet privacy / Security

Technology, Privacy, and Tor Andrew Lewman, 30 July 2013 Who is this guy?

Add to Reading List

Source URL: svn.torproject.org

Language: English - Date: 2013-08-01 20:43:23
343Privacy / Human rights / Identity management / Internet privacy / Expectation of privacy / Katz v. United States / Fourth Amendment to the United States Constitution / Surveillance / Personally identifiable information / Privacy law / Ethics / Law

Sensors in Public Spaces: The Law and Technology of Anonymity Co-authors Shuvo Chatterjee Mabel Feng

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-12-12 13:08:28
344Clinical research / Research / Research ethics / Informed consent / Human subject research / Anonymity / Pharmacology / Institutional review board / Ethical research in social science / Applied ethics / Ethics / Medical ethics

Ethical Issues in Linguistic Fieldwork Yuni Kim University of Manchester

Add to Reading List

Source URL: www.hrelp.org

Language: English - Date: 2009-05-27 18:45:02
345Matrix / Euclidean vector / Rank / Euclidean subspace / Algebra / Mathematics / Linear algebra

Pattern-Guided k-Anonymity

Add to Reading List

Source URL: fpt.akt.tu-berlin.de

Language: English - Date: 2013-10-21 04:21:43
346Human rights / Law / Privacy / Usability / Internet privacy / Credential / Anonymity / Framework Programmes for Research and Technological Development / Ethology / Identity management / Ethics / Social issues

Poster: Understanding and Using Anonymous Credentials Zinaida Benenson Friedrich-Alexander-University Erlangen-Nuremberg Erlangen, Germany

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:52
347Internet privacy / Internet memes / Hacking / Anonymous / Internet culture / Internet vigilantism / Anonymity / Giorgio Agamben / Project Chanology / Computing / Cybercrime / Internet

PDF Document

Add to Reading List

Source URL: www.michaelnagenborg.de

Language: English - Date: 2013-04-07 11:24:53
348Culture / Economics / Human rights / Law / Internet censorship / Anonymity / Ethics / Information society / Abuse

Microsoft PowerPoint - creds1305_hcgibbs.pptx

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:40:36
349Computing / Software / System software / Proxy servers / Tor / File sharing networks / Network congestion / Throughput / Peer-to-peer / Internet privacy / Network performance / Cryptographic software

How Low Can You Go: Balancing Performance with Anonymity in Tor John Geddes1 , Rob Jansen2 , and Nicholas Hopper1 1 University of Minnesota, Minneapolis, MN

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2013-05-06 18:02:20
350Tor / Anonymity / Alice and Bob / System software / Internet privacy / Computing / Software

Internet Freedom CS161: Computer Security Guest Lecturer: Paul Pearce Instructor: Vern Paxson TAs: Jethro Beekman, Mobin Javed Antonio Lupher, Me,

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-17 17:32:41
UPDATE