Pseudonymity

Results: 113



#Item
1Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis Loretta Ilaria Mancini

Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis Loretta Ilaria Mancini

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2013-12-10 12:26:56
    2Anonymity, Pseudonymity, and Gender Categorization as Social Justice Issues in HCI Abstract

    Anonymity, Pseudonymity, and Gender Categorization as Social Justice Issues in HCI Abstract

    Add to Reading List

    Source URL: media.wix.com

    Language: English - Date: 2016-06-22 00:27:02
      3Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project   Nick Mathewson

      Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

      Add to Reading List

      Source URL: netecon.seas.harvard.edu

      Language: English - Date: 2009-11-30 14:32:00
      4Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

      Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

      Add to Reading List

      Source URL: citesandinsights.info

      Language: English - Date: 2012-08-14 11:05:55
      5Defining	
  “Anonymity”	
  in	
  Networked	
   Communication,	
  version	
  1	
   Joan	
  Feigenbaum1	
   Technical	
  Report	
  YALEU/DCS/TR-­‐1448	
   December	
  2011	
   	
  

      Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

      Add to Reading List

      Source URL: www.cs.yale.edu

      Language: English - Date: 2012-01-20 15:00:46
      6Cites & Insights: Crawford at Large

      Cites & Insights: Crawford at Large

      Add to Reading List

      Source URL: citesandinsights.info

      Language: English - Date: 2012-08-13 22:41:17
      7Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

      Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:14
      8Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

      Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

      Add to Reading List

      Source URL: homes.soic.indiana.edu

      Language: English - Date: 2016-05-12 20:00:31
      9(Un)linkable Pseudonyms in Identity Management What is it about? To exchange data between servers, the items have to be linkable. However, to preserve

      (Un)linkable Pseudonyms in Identity Management What is it about? To exchange data between servers, the items have to be linkable. However, to preserve

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      - Date: 2015-12-01 04:00:02
      10“This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community Alex Leavitt Annenberg School for Communication & Journalism,

      “This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community Alex Leavitt Annenberg School for Communication & Journalism,

      Add to Reading List

      Source URL: alexleavitt.com

      Language: English - Date: 2014-12-01 20:12:59