Anonymity

Results: 917



#Item
551Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-08-25 02:26:06
552Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-11-21 04:37:48
553Public-key cryptography / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2010-04-08 06:22:18
554Email / Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2007-11-26 03:42:27
555Identity management / Social issues / Cryptography / Identity / Proxy servers / Tor / Anonymity / Middleware / Pseudonymity / Ethics / Internet privacy / Privacy

SECURITY & PRIVACY SECURITY & PRIVACY Location Privacy in Pervasive Computing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-08-21 16:21:29
556Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-06 09:13:02
557Wireless / Optimized Link State Routing Protocol / Onion routing / Dynamic Source Routing / Ad hoc On-Demand Distance Vector Routing / Link-state routing protocol / Wireless sensor network / Wireless ad-hoc network / Destination-Sequenced Distance Vector routing / Wireless networking / Routing / Technology

Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing ∗ Jiejun Kong† , Xiaoyan Hong‡ , M. Y. Sanadidi† , Mario Gerla† † Department of Computer Science ‡ Department of Computer

Add to Reading List

Source URL: netlab.cs.ucla.edu

Language: English - Date: 2007-12-26 15:31:01
558

Seminararbeit k-Anonymity und dessen Einfluss auf die Forschung Schriftliche Ausarbeitung angefertigt im Rahmen des Seminars "Sicherheitstechnologien der Informationsgesellschaft"

Add to Reading List

Source URL: www.distractedbysquirrels.com

Language: German - Date: 2011-03-22 17:48:33
    559Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

    Microsoft Word - Anon_Terminology_v0.26.doc

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2005-12-13 05:58:21
    560Internet / IP address / IP2Location / Address space / Ip / Anonymity / Computing / Geolocation / Network architecture

    IP2LOCATION™ IP-COUNTRY-REGION-CITY DATABASE DATA FILE SPECIFICATIONS Product: IP2Location™ IP-Country-Region-City Database [DB3] File Name: IP2Location_IP_Country_Region_City_ Specification.PDF

    Add to Reading List

    Source URL: www.ip2location.com

    Language: English - Date: 2014-07-11 04:02:21
    UPDATE