Anonymity

Results: 917



#Item
651Jacksonville /  Florida / Library science / University of Florida / Jacksonville Public Library / Jacksonville /  Arkansas / Public library / Library / Dallas / Florida / Geography of the United States / Government of Jacksonville /  Florida

Appendix 4 Key Jacksonville Stakeholder Interview Notes
 Here are notes, as stated by those who were interviewed. The stakeholders were promised anonymity by the principal consultant. Library should keep providing book

Add to Reading List

Source URL: jpl.coj.net

Language: English - Date: 2011-05-23 13:09:47
652Software / Tor / Computing / Onion routing / Internet privacy / Internet / Anonymity

Dissent in Numbers: Making Strong Anonymity Scale David Wolinsky1, Henry Corrigan-Gibbs1, Bryan Ford1, and Aaron Johnson2 1Yale University, 2US Naval Research Laboratory

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-10-17 16:49:46
653Identity management / Federated identity / Internet standards / Cryptography / Shibboleth / PERMIS / Security Assertion Markup Language / Voms / Authorization certificate / Security / Computing / Computer security

Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration Von Welch,1 Tom Barton,3 Kate Keahey,2 Frank Siebenlist2 1 2

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-07 10:08:33
654Password / Tip / Anonymous / Text messaging / Smartphone / Anonymity / Personal life / Cybercrime / U.S. Air Force Office of Special Investigations / Computing

SEE SOMETHING? SAY SOMETHING! REPORT SUSPICIOUS ACTIVITY! What happens when I contact the Tip Line? GET

Add to Reading List

Source URL: www.osi.af.mil

Language: English - Date: 2013-06-11 15:14:27
655Evaluation methods / Internet privacy / Anonymity / Survey methodology / Privacy / Ethics / Science / Sociology

Basic Consent Elements Telephone and Mail Surveys Interviews and Focus Groups (Bolded Items are Required Unless Waived by the WSIRB)

Add to Reading List

Source URL: dshs.wa.gov

Language: English - Date: 2014-06-10 16:52:56
656Online chat / Internet privacy / Software / Anonymous post / Pseudonymity / Internet Relay Chat / Anonymizer / Tor / Sybil attack / Computing / Anonymity / Internet

Hang With Your Buddies to Resist Intersection Attacks David Isaac Wolinsky, Ewa Syta, and Bryan Ford Yale University {david.wolinsky,ewa.syta,bryan.ford}@yale.edu

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-08-27 00:18:21
657Computing / Anonymity / Virtual machines / Anonymizer / Hyper-V / Hardware virtualization / Google Chrome OS / Hypervisor / Anonymous web browsing / System software / Internet privacy / Software

Managing NymBoxes for Identity and Tracking Protection arXiv:1312.3665v2 [cs.OS] 5 May 2014 Abstract Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification,

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-05-06 01:40:37
658Internet privacy / Anonymous remailer / Proxy server / Tor / Anonymity / JavaScript / Email / Internet Relay Chat / Mixminion / Computing / Software / Internet

Conscript Your Friends into Larger Anonymity Sets with JavaScript ∗ Henry Corrigan-Gibbs

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-09-16 13:16:03
659National security / Human rights / Law enforcement / Surveillance / Privacy / Internet privacy / Anonymity / Mass surveillance / Legal aspects of computing / Ethics / Security / Crime prevention

Global Partners_Digital Logos_P2

Add to Reading List

Source URL: www.law-democracy.org

Language: English - Date: 2014-08-13 13:38:40
UPDATE