Anonymity

Results: 917



#Item
51Twelve-step programs / Substance abuse / Alcoholics Anonymous / Traditions / Twelve Traditions / Mental health / Support groups / Culture / Anonymity / Child abuse / Abuse / Anonymous

Adult Survivors of Child Abuse Anonymous – 12 Traditions The 12 Traditions of ASCAA: Our common welfare should come first; personal recovery depends upon ASCAA unity. 

Add to Reading List

Source URL: www.asca12step.org

Language: English - Date: 2014-01-08 11:46:22
52Non-homogeneous Generalization in Privacy Preserving Data Publishing ∗ W. K. Wong, Nikos Mamoulis and David W. Cheung Department of Computer Science, The University of Hong Kong

Non-homogeneous Generalization in Privacy Preserving Data Publishing ∗ W. K. Wong, Nikos Mamoulis and David W. Cheung Department of Computer Science, The University of Hong Kong

Add to Reading List

Source URL: event.cwi.nl

Language: English - Date: 2010-08-10 12:02:00
53PLEASE	DO	NOT	DISTRIBUTE  Identities	&	Permission-Groups for	Blockchains Overview	of	MIT	ChainAnchor Project Thomas	Hardjono &	Alex	(Sandy)	Pentland

PLEASE DO NOT DISTRIBUTE Identities & Permission-Groups for Blockchains Overview of MIT ChainAnchor Project Thomas Hardjono & Alex (Sandy) Pentland

Add to Reading List

Source URL: connection.mit.edu

Language: English - Date: 2016-02-22 12:39:26
54RFC 7844 : Anonymity profile for DHCP clients St´ephane Bortzmeyer <> Premi`ere r´edaction de cet article le 29 mai 2016

RFC 7844 : Anonymity profile for DHCP clients St´ephane Bortzmeyer <> Premi`ere r´edaction de cet article le 29 mai 2016

Add to Reading List

Source URL: www.bortzmeyer.org

Language: French - Date: 2016-07-23 11:15:37
    55Sociology at Surrey  University of Surrey social research

    Sociology at Surrey University of Surrey social research

    Add to Reading List

    Source URL: sru.soc.surrey.ac.uk

    Language: English - Date: 2005-02-22 12:08:19
    56StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

    StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16
      57Microsoft Word - An End to Trolling--Aprildocx

      Microsoft Word - An End to Trolling--Aprildocx

      Add to Reading List

      Source URL: www.mediainstitute.org

      Language: English - Date: 2016-04-26 15:35:24
      58EthicsLine Question & Answer    

      EthicsLine Question & Answer    

      Add to Reading List

      Source URL: secure.ethicspoint.com

      Language: English - Date: 2012-08-08 14:10:48
      59Data De-identification and Anonymization of Individual Patient Data in Clinical Studies – A Model Approach Background TransCelerate BioPharma Inc. is a non-profit organization of biopharmaceutical companies focused on

      Data De-identification and Anonymization of Individual Patient Data in Clinical Studies – A Model Approach Background TransCelerate BioPharma Inc. is a non-profit organization of biopharmaceutical companies focused on

      Add to Reading List

      Source URL: www.transceleratebiopharmainc.com

      Language: English - Date: 2015-12-07 16:55:03
      60Microsoft Word - TR1452.doc

      Microsoft Word - TR1452.doc

      Add to Reading List

      Source URL: cpsc.yale.edu

      Language: English - Date: 2013-11-04 14:15:57