Anonymity

Results: 917



#Item
491Programming paradigms / Probability and statistics / Attribute grammar / Compiler construction / Parsing / Entropy / Kullback–Leibler divergence / Privacy / Cross entropy / Statistical theory / Statistics / Ethics

t-Closeness: Privacy Beyond k-Anonymity and -Diversity Ninghui Li Tiancheng Li Department of Computer Science, Purdue University {ninghui, li83}@cs.purdue.edu Abstract

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 2006-11-22 22:26:00
492Public-key cryptography / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2010-08-10 05:10:14
493Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-02-20 03:56:29
494Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2009-12-18 03:56:23
495Identity / Anonymity / Pseudonymity / Crowds / Pseudonym / Public-key cryptography / Privacy-enhancing technologies / Academi / Digital identity / Cryptography / Identity management / Security

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-05-29 09:44:06
496Franchising / Economics / Repurchase agreement / Business / MTS

Factsheet MidPrice for cash dealers. Orderly price discovery and execution with pre-trade anonymity. MidPrice on the MTS Cash interdealer platform offers an orderly method of price discovery, based on real executable mar

Add to Reading List

Source URL: www.mtsmarkets.com

Language: English - Date: 2013-11-27 09:04:18
497Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Email / Tor / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

- 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:02:08
498Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Tor / Email / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

- 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:55:56
499Computing / Cryptographic software / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Troll / Cryptography / Internet / Internet privacy

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.15 and all succeeding versions) Change Histor

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 03:22:41
500Anonymity / Pseudonymity / Degree of anonymity / Tor / Pseudonym / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-20 02:12:55
UPDATE