Pseudonymity

Results: 113



#Item
101Identity management / Social issues / Law / Internet privacy / Information privacy / Pseudonymity / Ethics / Privacy / Human rights

Enforceable Privacy with PRECIOSA Frank Kargl – Ulm University ITS World Congress 2009 SIS 46: Privacy and Data Protection within ITS Stockholm, [removed]

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2009-10-01 08:44:27
102Anonymity / Computing / Pseudonymity / Tor / Online identity / 2channel / Anonymous P2P / Censorship in South Korea / Internet privacy / Cryptography / Internet

Online Collectivism, Individualism and Anonymity in East Asia Kenneth Farrall NYU Dept. of Media, Culture and Communication WORKING DRAFT: PLEASE DO NOT CITE OR QUOTE WITHOUT PERMISSION Abstract: Entering the second deca

Add to Reading List

Source URL: www.digitallymediatedsurveillance.ca

Language: English - Date: 2011-05-06 10:51:29
103Online chat / Internet privacy / Software / Anonymous post / Pseudonymity / Internet Relay Chat / Anonymizer / Tor / Sybil attack / Computing / Anonymity / Internet

Hang With Your Buddies to Resist Intersection Attacks David Isaac Wolinsky, Ewa Syta, and Bryan Ford Yale University {david.wolinsky,ewa.syta,bryan.ford}@yale.edu

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-08-27 00:18:21
104Anonymity / Electronic documents / Email / Internet privacy / Anonymous remailer / Pseudonymity / Anonymous post / IMail / Electronic money / Cryptography / Internet / Computing

Assessing Anonymous Communication on the Internet: Policy Deliberations Rob Kling and Ya-ching Lee Center for Social Informatics, Indiana University, Bloomington, Indiana, USA Al Teich and Mark S. Frankel

Add to Reading List

Source URL: smg.media.mit.edu

Language: English - Date: 2006-03-04 13:07:46
105Cryptographic software / Internet / Email / Hushmail / PGP / Webmail / Pseudonymity / Passphrase / HTTP cookie / Computing / Internet privacy / Cryptography

Real World Patterns of Failure in Anonymity Systems Richard Clayton, George Danezis, and Markus G. Kuhn University of Cambridge, Computer Laboratory, Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, United Kingdom

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2002-06-08 10:10:59
106Network architecture / Internet privacy / Delay-tolerant networking / Wireless networking / Media technology / Mesh networking / Email / Store and forward / Routing / Computing / Network protocols / Internet

Privacy Challenges in Delay-Tolerant and Restricted-Route Networks Joss Wright, Ian Brown {joss.wright,ian.brown}@oii.ox.ac.uk Oxford Internet Institute, University of Oxford May 7, 2010

Add to Reading List

Source URL: www.pseudonymity.net

Language: English - Date: 2010-05-14 03:44:02
107Internet / Onion routing / Tor / .onion / Routing / Pseudonymity / Anonymity / Communications protocol / Universal composability / Cryptography / Internet privacy / Computing

Anonymity Analysis of Onion Routing in the Universally Composable Framework Joan Feigenbaum Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-07-09 22:10:10
108Computing / Anonymity / Pseudonymity / Degree of anonymity / Anonymous remailer / Onion routing / Crowds / Mixminion / Tor / Cryptography / Internet privacy / Internet

Systems for Anonymous Communication George Danezis∗ Claudia Diaz† Paul Syverson‡

Add to Reading List

Source URL: www.syverson.org

Language: English - Date: 2012-03-07 11:03:27
109Ethics / Anonymity / Pseudonymity / Tor / Computer crime / Privacy / Penet remailer / Cyberspace / Anonymizer / Cryptography / Internet privacy / Internet

Anonymity in Cyberspace: Finding the Balance between Privacy and Security

Add to Reading List

Source URL: www.droit-tic.com

Language: English - Date: 2006-07-10 02:12:15
110Anonymity / Cryptographic software / Pseudonymity / Tor / Crowds / Cyberspace / Pseudonymous remailer / Cypherpunk anonymous remailer / Cryptography / Internet privacy / Anonymous remailer

PDF Document

Add to Reading List

Source URL: www.thsh.com

Language: English - Date: 2009-11-18 12:35:07
UPDATE