Dud

Results: 174



#Item
61

Herr Präsident, hohes Gericht, sehr geehrte Damen und Herren, Sechs Punkte zur Informations- und Kommunikationstechnik sind aus meiner Sicht besonders bedeutsam: 1. Moderne Speichertechniken (Bsp. USB-Stick, 32 GByte, 3

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2009-12-17 03:32:17
    62

    ajum_2014ii_fischer-Dud_411-01

    Add to Reading List

    Source URL: www.ajum.de

    Language: German - Date: 2014-07-03 16:59:49
      63Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

      Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 08:07:30
      64Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

      Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 02:48:10
      65Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

      - 11 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 02:48:10
      66

      Prof. Dr. Andreas Pfitzmann

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: German - Date: 2009-05-28 02:46:53
        67Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Digital identity / Tor / Public-key cryptography / Email / Cryptography / Identity / Internet privacy

        - 20 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-09-20 02:12:24
        68Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

        - 14 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-07-16 06:43:34
        69Anonymity / Pseudonymity / Pseudonym / Degree of anonymity / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

        Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-07-21 08:19:36
        70Internet / Computing / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Tor / Troll / Cryptography / Internet privacy / Cryptographic software

        Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-08-19 04:31:35
        UPDATE