Anonymity

Results: 917



#Item
401Consent / Yes and no / Vulnerability / Law / Cyberwarfare / Internet privacy / Anonymity / Computer security

Sharing personal information of families and vulnerable children The Escalation Ladder How to use the Escalation Ladder

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-11-16 19:44:39
402Structure / Ethics / Legal terms / Humans / Person / Self / Legal personality / Corporation / Anonymity / Law / Legal entities / Corporations law

Title: “D17.3: Bridging the accountability gap: rights for new entities in the information society?” Author:

Add to Reading List

Source URL: www.fidis.net

Language: English - Date: 2009-04-29 04:51:18
403Trusted Computing / Group signature / Digital signature / Anonymity / Public key certificate / Certificate authority / Digital credential / Direct Anonymous Attestation / Cryptography / Public-key cryptography / Key management

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
404National security / Human rights / Law enforcement / Surveillance / Privacy / Internet privacy / Anonymity / Mass surveillance / Legal aspects of computing / Ethics / Security / Crime prevention

Global Partners_Digital Logos_P2

Add to Reading List

Source URL: www.gp-digital.org

Language: English - Date: 2014-08-11 11:21:16
405Identity management / Social issues / Computing / Personally identifiable information / Anonymity / HTTP cookie / World Wide Web / In re Gateway Learning Corp. / Online Privacy Protection Act / Ethics / Privacy / Internet privacy

PRIVACY POLICY Rockefeller Center takes seriously the issue of safeguarding your privacy on-line. This Privacy Policy outlines the information we collect and how it will be used to

Add to Reading List

Source URL: assets.tsstaticfiles.com

Language: English - Date: 2014-10-31 10:58:08
406Computing / Tor / Anonymity / Privacy / Association for Progressive Communications / Onion routing / Anonymous P2P / Internet privacy / Ethics / Internet

The right to freedom of expression and the use of encryption and anonymity in digital communications Submission to the United Nations Special Rapporteur on the Right to Freedom of Opinion and Expression by the Associatio

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:16
407Computing / Internet / Human rights / Internet privacy / Computer law / Anonymity / Freedom of the press / Tor / Internet censorship / Ethics / Privacy / Internet ethics

Microsoft Word - Freedom House_OHCHR_report_encryption and anonymity online

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:18
408Anonymity / Privacy / Science / Census / Degree of anonymity / Information privacy / Record linkage / Personally identifiable information / Ethics / Statistics / Internet privacy

Revisiting the Uniqueness of Simple Demographics in the US Population Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-08-24 19:48:02
409Data / Email / Anonymity / Public-key cryptography / Attribution / Communications protocol / Authentication / Internet privacy / Journalism sourcing / Computing / Social psychology / Information

Attribution Requirements for the Next Generation Internet Jeffrey Hunker Carrie Gates Matt Bishop

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-08-09 18:09:40
410Computing / System software / Degree of anonymity / Onion routing / Tor / Anonymity / Ciphertext indistinguishability / Adversary model / Internet privacy / Cryptographic software / Internet

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: www.infsec.cs.uni-saarland.de

Language: English - Date: 2014-10-15 11:46:33
UPDATE