Privacy software

Results: 6129



#Item
751Randomness extractor / Applied mathematics / Mathematics / Calculus / Continuous function

Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yaoa,b , Zhoujun Lia,c a State Key Laboratory of Software Development Environment, Beihang University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 23:01:04
752Keyhole Markup Language / Web 2.0 / Google / Human–computer interaction / World Wide Web / Internet privacy / Internet / Criticism of Google / Software / Computing / Digital media

July 7, 2010 The Honorable Jane Harman United States House of Representatives 2400 Rayburn House Office Building Washington, D.CDear Rep. Harman:

Add to Reading List

Source URL: insidegoogle.com

Language: English - Date: 2015-03-17 13:51:41
753ITunes / Mobile software / Intellectual property law / Patent law / Royalties

DROPKLOUD TERMS AND CONDITIONS Effective as of March 16, 2015 Please read the following terms and conditions carefully. These terms and conditions, as well as the copyright policy (the “Copyright Policy”) and privacy

Add to Reading List

Source URL: dropkloud.com

Language: English - Date: 2015-03-16 17:58:51
754Software / Intranet / Computing / Microsoft SharePoint / Systems engineering process / Project management / Knowledge management / Business software / SharePoint Dashboard / Computer networks / Internet privacy / Content management systems

KM COLUMN FEBRUARYSelecting the right SharePoint

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 03:03:33
755Computing / Ubiquitous computing / Mobile computers / Bluetooth / Privacy / Radio-frequency identification / ANT / Software protection dongle / Bluetooth low energy / Technology / Wireless / Telecommunications engineering

Aleis Readers Experience that Counts Model 9162 Options Available

Add to Reading List

Source URL: www.allflex.com.au

Language: English - Date: 2014-12-22 20:07:42
756HTTP / Federated identity / CoSign single sign on / Computer network security / Internet privacy / Cryptographic protocols / Kerberos / Load balancing / Server / Software / Computing / System software

Setting Up Cosign Clients March 4, 2003 This presentation was originally given at an Academic Computing Support Forum (ACSF) meeting at the University of Michigan.

Add to Reading List

Source URL: weblogin.org

Language: English
757Software / Cryptographic software / Tor / Adversary model / Onion / Onion routing / Internet privacy / Horse racing / Computing

 Trust-­‐based  Anonymous  Communica4on:   Models  and  Rou4ng  Algorithms   Aaron  Johnson   U.S.  Naval  Research  Laboratory   Paul  Syverson   U.S.  Naval  Resea

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-11-02 11:33:27
758Web 2.0 / Android software / Social information processing / Videotelephony / My Phone / Windows Mobile / Text messaging / Semantic Web / Internet privacy / Computing / Technology / World Wide Web

PDF Document

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2008-10-22 05:02:03
759Video game development / Law / Computer law / Entertainment Software Association / Software licenses / Internet privacy / End-user license agreement / Trademark / Application software / Electronic Arts / Origin / Software

Microsoft Word - EULA_Origin _June launch_

Add to Reading List

Source URL: eacom.s3.amazonaws.com

Language: English - Date: 2011-06-02 17:34:12
UPDATE