Pseudonymity

Results: 113



#Item
1

Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis Loretta Ilaria Mancini

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2013-12-10 12:26:56
    2

    Anonymity, Pseudonymity, and Gender Categorization as Social Justice Issues in HCI Abstract

    Add to Reading List

    Source URL: media.wix.com

    Language: English - Date: 2016-06-22 00:27:02
      3Computing / Cryptography / Internet / Internet privacy / Secure communication / Anonymous remailer / Crypto-anarchism / Pseudonymity / Anonymity / Mix network / Traffic analysis / Tor

      Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

      Add to Reading List

      Source URL: netecon.seas.harvard.edu

      Language: English - Date: 2009-11-30 14:32:00
      4Anonymity / Digital media / Cryptography / World Wide Web / Crypto-anarchism / Pseudonymity / Blog / Anonymous blog / ScienceBlogs

      Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

      Add to Reading List

      Source URL: citesandinsights.info

      Language: English - Date: 2012-08-14 11:05:55
      5Computing / Internet / Cryptography / Anonymity / Dark web / Anonymous remailer / Email / Pseudonymity / Internet privacy / Tor / Dining cryptographers problem

      Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

      Add to Reading List

      Source URL: www.cs.yale.edu

      Language: English - Date: 2012-01-20 15:00:46
      6World Wide Web / Digital media / Anonymity / Music industry / Blogging / Blog / Diaries / New media / Web 2.0 / Pseudonymity / Ambition / Anonymous blog

      Cites & Insights: Crawford at Large

      Add to Reading List

      Source URL: citesandinsights.info

      Language: English - Date: 2012-08-13 22:41:17
      7Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

      Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:14
      8Public-key cryptography / Identity management / Public key infrastructure / Key management / Cryptography / Privacy-enhancing technologies / Pseudonymity / Authentication / Blacklist / User / Internet privacy / Anonymity

      Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

      Add to Reading List

      Source URL: homes.soic.indiana.edu

      Language: English - Date: 2016-05-12 20:00:31
      9Identity management / Internet privacy / Pseudonym / Privacy / Pseudonymity / Digital credential

      (Un)linkable Pseudonyms in Identity Management What is it about? To exchange data between servers, the items have to be linkable. However, to preserve

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      - Date: 2015-12-01 04:00:02
      10Internet culture / Anonymity / Virtual communities / Internet privacy / Social bookmarking / Reddit / Pseudonymity / Online identity / Self-disclosure / Tor / Online community / Privacy

      “This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community Alex Leavitt Annenberg School for Communication & Journalism,

      Add to Reading List

      Source URL: alexleavitt.com

      Language: English - Date: 2014-12-01 20:12:59
      UPDATE