Pseudonymity

Results: 113



#Item
91Email / Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2007-11-26 03:42:27
92Identity management / Social issues / Cryptography / Identity / Proxy servers / Tor / Anonymity / Middleware / Pseudonymity / Ethics / Internet privacy / Privacy

SECURITY & PRIVACY SECURITY & PRIVACY Location Privacy in Pervasive Computing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-08-21 16:21:29
93Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-06 09:13:02
94Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

Microsoft Word - Anon_Terminology_v0.26.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-13 05:58:21
95Privacy / Social issues / Identity / Human rights / Privacy-enhancing technologies / Pseudonymity / Internet privacy / Information privacy / P3P / Identity management / Ethics / Cryptography

IPT2E676[removed]:38 Uhr Privacy-Enhancing Identity Management Sebastian Clauß, Andreas Pfitzmann, Dresden University of Technology , Marit Hansen , Independent Centre for Privacy

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-01-13 08:52:16
96Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-09 03:55:01
97Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:25:56
98Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2008-02-15 04:36:42
99Anonymity / Eszter Hargittai / Pseudonymity / Internet / Technology / Entertainment / Digital media / Free music / Newgrounds

To appear in: Digital Research Confidential (E. Hargittai and C. Sandvig, editors). Cambridge: MIT Press. When Should We Use Real Names in Published Accounts of Internet Research? by Amy Bruckman, Kurt Luther, and Casey

Add to Reading List

Source URL: kurtluther.com

Language: English - Date: 2013-05-01 11:44:59
100Computing / Anonymity / Proxy servers / Pseudonymity / Tor / Crowds / Internet Relay Chat / Block / Cryptography / Internet privacy / Internet

Nymble: Anonymous IP-Address Blocking? Peter C. Johnson1 , Apu Kapadia1,2 , Patrick P. Tsang1 , and Sean W. Smith1 1 Department of Computer Science Dartmouth College

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2007-05-25 21:48:58
UPDATE