Anonymity

Results: 917



#Item
541Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Tor / Public-key cryptography / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:03:04
542Pseudonymity / Pseudonym / Public-key cryptography / Tor / Digital credential / Cryptography / Internet privacy / Anonymity

- 7 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:03:04
543Cryptographic software / Internet / Software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.34 Aug. 10, 2010)

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2010-08-10 05:09:20
544Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:52:12
545Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Anonymous P2P / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:15:52
546Internet / Computing / Location obfuscation / World Wide Web / Cloaking / Anonymizer / Location-based service / P3P / Anonymity / Geolocation / Internet privacy / Navigation

Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid Bhuvan Bamba, Ling Liu, Peter Pesti, Ting Wang College of Computing Georgia Institute of Technology Atlanta, GA 30332, USA

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2008-03-03 09:30:02
547Biology / Spawn / Chest / Thorax / Obesity

How Not to Preserve Privacy k-Anonymity: a Model For Protecting Privacy Latanya Sweeny

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-02-24 12:05:04
548Human communication / Social psychology / Eigenface / Anonymity / Behavioural sciences / Behavior / Science / Face recognition / Chinese culture / Face

De-identifying Facial Images using k-anonymity Ori Brostovski March 2, 2008 Outline

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-03-04 15:30:52
549Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Pseudonym / Crowds / Digital identity / Academi / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-13 05:57:14
550Pseudonymity / Cryptographic software / Email / Tor / Public-key cryptography / Academi / Cryptography / Internet privacy / Anonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2007-07-31 02:11:59
UPDATE