Crowds

Results: 572



#Item
321Identity / Anonymity / Pseudonymity / Crowds / Pseudonym / Public-key cryptography / Privacy-enhancing technologies / Academi / Digital identity / Cryptography / Identity management / Security

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-05-29 09:44:06
322Distributed computing / Peer-to-peer / BitTorrent / Gnutella / CoopNet content distribution system / Leech / HTTP / File sharing / ANts P2P / Computing / Concurrent computing / File sharing networks

1 Flashback: A Peer-to-Peer Web Server for Flash Crowds Mayur Deshpande, Abhishek Amit, Mason Chang, Nalini Venkatasubramanian, and Sharad Mehrotra University of California, Irvine

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2007-03-05 13:16:21
323Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:10
324Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 11 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:10
325Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Digital identity / Tor / Public-key cryptography / Email / Cryptography / Identity / Internet privacy

- 20 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-20 02:12:24
326Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

- 14 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 06:43:34
327Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity Ð A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:34
328Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Digital identity / Tor / Public-key cryptography / Email / Cryptography / Identity / Internet privacy

- 19 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-03 03:58:40
329Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 11 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:49:58
330Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

- 15 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 03:21:56
UPDATE