Dud

Results: 174



#Item
91Pseudonymity / Cryptographic software / Crowds / Pseudonym / Public-key cryptography / Email / Tor / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

- 9 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:54:56
92Computer law / Cross-platform software / Open-source software / Proprietary software / Open source software development / Open source / Source code / Debian / Free software / Software licenses / Software / Computing

- 15 - Appeared in: Computers & Security[removed]471 The Open Source Approach – Opportunities and Limitations

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2002-09-20 07:46:17
93

Microsoft Word - FePf06.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2006-10-04 08:41:20
    94Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

    Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-16 02:50:25
    95Surveillance / Identification / Hand geometry / Smart card / Biometrics Institute / Biometric points / Security / Biometrics / National security

    Biometrics – How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany [removed]

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2008-09-22 07:43:54
    96Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

    Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 02:52:12
    97National security / Surveillance / Fingerprint / Hand geometry / Authentication / Biometrics Institute / Biometric passport / Security / Biometrics / Identification

    1 Biometrics – how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics?

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2008-04-28 04:18:51
    98Cryptographic software / Internet / Software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

    A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.33 April 8, 2010)

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2010-04-08 06:22:32
    99Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

    - 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 02:48:34
    100Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Tor / Digital identity / Public-key cryptography / Email / Cryptography / Internet privacy / Identity

    - 23 - Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2005-07-28 09:22:20
    UPDATE