Dud

Results: 174



#Item
81Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 11 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:49:58
82Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Tor / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-03 04:10:42
83Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

- 15 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 03:21:56
84Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

- 14 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-09 04:02:00
85Cryptographic software / Internet / Software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.32 December 18, 2009)

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2009-12-18 03:59:02
86Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:53:40
87

Freiburg2008.11.28GM60.ppt

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2008-12-09 03:00:00
    88Cryptographic software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

    Microsoft Word - Anon_Terminology_v0.30.doc

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2007-11-26 03:42:56
    89

    Erschien in: Dieter Klumpp, Herbert Kubicek, Alexander Roßnagel, Wolfgang Schulz (Hg.): Netzwelt – Wege, Werte, Wandel; Springer, Berlin Heidelberg 2010, 245–263 Identitätsmanagement in Netzwelten Sandra Steinbrech

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: German - Date: 2009-12-08 08:37:40
      90Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Email / Tor / Cryptography / Internet privacy / Anonymity

      - 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 08:26:00
      UPDATE