Anonymity

Results: 917



#Item
561Anonymity / Analysis / Mathematical sciences / Data analysis / Probability theory / Variance

n-Confusion: a generalization of k-anonymity Klara Stokes Vicenç Torra Universitat Rovira i Virgili

Add to Reading List

Source URL: www.edbt.org

Language: English - Date: 2012-02-02 12:48:04
562Geolocation / Computing / IP address / IP2Location / Ip / Anonymity / Computer network security / Internet protocols / X-Originating-IP / Network architecture / Internet / Internet standards

IP2LOCATION™ IP-COUNTRY-ISP DATABASE DATA FILE SPECIFICATIONS IP2Location™ IP-Country-ISP Database [DB2] IP2Location_IP_Country_ISP_Specification.PDF 5 i. CSV

Add to Reading List

Source URL: www.ip2location.com

Language: English - Date: 2014-07-11 04:02:06
563Technology / Geolocation / Cryptographic software / Geosocial networking / Location-based service / Tracking / Tor / Email / Anonymity / Internet / Computing / Internet privacy

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 1,

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2010-05-15 06:46:43
564John Doe / Doe subpoena / Anonymous post / Strategic lawsuit against public participation / Federal Rules of Civil Procedure / Subpoena duces tecum / Discovery / Anonymity / Doe v. Cahill / Law / Legal terms / Lawsuits

Litigating Civil Subpoenas to Identify Anonymous Internet Speakers by Paul Alan Levy In September 2007, Arizona resident Justin Leonard received

Add to Reading List

Source URL: www.citizen.org

Language: English - Date: 2011-07-27 18:31:07
565Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-09 03:55:01
566Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:25:56
567Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2008-02-15 04:36:42
568Experian / Business intelligence / Know your customer / Analytics / HTTP cookie / Financial economics / Credit / Internet privacy

FraudNet for Transactions The anonymity of the Internet makes it more difficult than ever to Know Your Customer. Unfortunately, many of the tools available to assist merchants in understanding the risk associated with ea

Add to Reading List

Source URL: www.experian.fr

Language: English - Date: 2014-10-14 09:09:17
569Knowledge representation / Metadata / Technical communication / Personally identifiable information / Information privacy / Anonymity / European Union / Data / Political philosophy / Data management / Privacy / Information

BMB online tool for the assessment of legal and ethical requirements Murat Sariyar TMF - Technology, Methods, and Infrastructure for Networked Medical Research

Add to Reading List

Source URL: www.biomedbridges.eu

Language: English - Date: 2014-07-03 06:57:41
570Research / Statistics / Research methods / Data collection / Evaluation methods / Marketing research / Survey methodology / Qualitative marketing research / Market research / Marketing / Science

Anonymity in Market, Social and Opinion Research Barry Ryan Standards & Policy Manager

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-11-17 10:11:04
UPDATE