Anonymity

Results: 917



#Item
61Internet privacy / Computing / Privacy / Identity management / Technology / Personally identifiable information / Gmail / Medical privacy / Computer security / HTTP cookie / ViaSat / Anonymity

WildBlue Communications, Inc. – Subscriber Privacy Policy This Privacy Policy covers all web sites under the wildblue.net domain (such as www.wildblue.net and help.wildblue.net) and applies to all current and former c

Add to Reading List

Source URL: www.orderwirelessinternet.com

Language: English - Date: 2013-01-04 20:30:45
62Cryptocurrencies / Bitcoin / Alternative currencies / Blockchain / Financial technology / Internet privacy / Anonymity / Currency / Numismatics

PLEASE DO NOT DISTRIBUTE Identities & Permission-Groups for Blockchains Overview of MIT ChainAnchor Project Thomas Hardjono & Alex (Sandy) Pentland

Add to Reading List

Source URL: petertodd.org

Language: English - Date: 2016-04-20 12:42:05
63Anonymity / Privacy / Information / Statistics / Knowledge / Categorical data / Multivariate statistics / Dimension reduction / K-anonymity / Data anonymization / Mosaic plot / Contingency table

STATISTICAL DISCLOSURE CONTROL FOR MICRODATA: A PRACTICE G UIDE THIJS BENSCHOP CATHRINE MACHINGAUTA MATTHEW WELCH July 2016 Version 1.1

Add to Reading List

Source URL: www.ihsn.org

Language: English - Date: 2016-07-28 08:44:49
64Computing / Cryptography / Internet / Internet privacy / Secure communication / Anonymous remailer / Crypto-anarchism / Pseudonymity / Anonymity / Mix network / Traffic analysis / Tor

Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:00
65Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:28:28
66

OSA Sample Scholarship Essays Some of the following content has been altered to maintain anonymity. MSU standards for intellectual honesty apply to scholarship application essays. Essays copied in whole or in part from

Add to Reading List

Source URL: studyabroad.isp.msu.edu

Language: English - Date: 2010-09-27 09:36:02
    67Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

    Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2007-02-22 22:55:51
    68Anonymity / Digital media / Cryptography / World Wide Web / Crypto-anarchism / Pseudonymity / Blog / Anonymous blog / ScienceBlogs

    Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

    Add to Reading List

    Source URL: citesandinsights.info

    Language: English - Date: 2012-08-14 11:05:55
    69Software / Reverse proxy / Free software / Computing / Anonymity / X-Forwarded-For / Web development / IP addresses / Web server / Apache HTTP Server / HAProxy / ALOHAnet

    ALOHA Load-Balancer - Application Note Get client IP in Apache HTTPD Document version: v1.1 Last update:

    Add to Reading List

    Source URL: www.haproxy.com

    Language: English - Date: 2014-04-28 06:52:23
    UPDATE