Dud

Results: 174



#Item
111Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Tor / Public-key cryptography / Identity management / Cryptography / Identity / Internet privacy

- 16 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-22 03:49:28
112Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

Microsoft Word - Anon_Terminology_v0.25.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-06 09:12:55
113Cryptographic software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

Microsoft Word - Anon_Terminology_v0.29.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2007-07-31 02:12:21
114Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Tor / Public-key cryptography / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:03:04
115Pseudonymity / Pseudonym / Public-key cryptography / Tor / Digital credential / Cryptography / Internet privacy / Anonymity

- 7 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:03:04
116

Microsoft Word - FePf06.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2006-11-15 08:33:50
    117Cryptographic software / Internet / Software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

    A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.34 Aug. 10, 2010)

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2010-08-10 05:09:20
    118Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

    - 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 02:52:12
    119Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Anonymous P2P / Cryptography / Internet privacy / Cryptographic software

    Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 08:15:52
    120Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Pseudonym / Crowds / Digital identity / Academi / Cryptography / Security / Identity management

    DOC Document

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2005-12-13 05:57:14
    UPDATE