Privacy-enhancing technologies

Results: 201



#Item
131Identity / Anonymity / Pseudonymity / Crowds / Pseudonym / Public-key cryptography / Privacy-enhancing technologies / Academi / Digital identity / Cryptography / Identity management / Security

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-05-29 09:44:06
132Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

Microsoft Word - Anon_Terminology_v0.27.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-02-20 03:57:33
133Ethics / Ethology / Privacy / Identity / Human rights / Privacy-enhancing technologies / Internet privacy / Social networking service / P3P / Identity management / Technology / Social issues

W3C - Workshop on the Future of Social Networking – Position Paper Alberto Crespo, Rubén Méndez (ATOS ORIGIN) and Katja Liesebach (Goethe-Universität Frankfurt) PICOS – Privacy and Identity Management for Communit

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2008-11-06 08:30:15
134Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology (Version v0.24 Nov. 21, 2005) Andreas Pfitzmann

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-11-21 04:38:01
135Computer security / Security / Security Assertion Markup Language / OpenID / Shibboleth / Federated identity management / Authentication / Privacy-enhancing technologies / PERMIS / Identity management / Federated identity / Identity

IDENTITY MANAGEMENT SYSTEMS Federated Identity Management Systems: A Privacy-Based Characterization Eleanor Birrell and Fred B. Schneider | Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-10-17 13:49:06
136Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

Microsoft Word - Anon_Terminology_v0.25.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-06 09:12:55
137Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Pseudonym / Crowds / Digital identity / Academi / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-13 05:57:14
138Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-08-25 02:26:06
139Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-11-21 04:37:48
140Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-06 09:13:02
UPDATE