Pseudonymity

Results: 113



#Item
11

Watermarked tokens and pseudonymity on public blockchains By Tim Swanson Published: November 4, 2015 Abstract Over its nearly seven-year incubation, Bitcoin has attracted a diverse set of entrepreneurs, developers, inves

Add to Reading List

Source URL: static1.squarespace.com

Language: English
    12

    Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis Loretta Ilaria Mancini

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2013-12-10 12:26:56
      13Anonymity / Digital media / Cryptography / World Wide Web / Crypto-anarchism / Pseudonymity / Blog / Anonymous blog / ScienceBlogs

      Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

      Add to Reading List

      Source URL: www.citesandinsights.info

      Language: English - Date: 2012-08-14 11:05:55
      14Anonymity / Blogging / Blog / Pseudonymity / Ambition / Anonymous blog

      Cites & Insights: Crawford at Large

      Add to Reading List

      Source URL: www.citesandinsights.info

      Language: English - Date: 2012-08-13 22:41:17
      15Computer access control / Security token / Access token / Token / Password / Pseudonymity / Authentication / Blind signature

      FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2011-08-18 16:53:40
      16Computing / Internet / Human rights / Anonymity / Internet ethics / Pseudonymity / Privacy / Tor / Crypto-anarchism / Ethics / Internet privacy / Computer law

      1    Anonymity and Encryption   Comments submitted to the United Nations Special Rapporteur on  the Promotion and Protection of the Right to Freedom of Opinion 

      Add to Reading List

      Source URL: www.ohchr.org

      Language: English - Date: 2015-06-02 08:49:14
      17Internet privacy / Cryptographic software / Anonymity / Anonymous remailer / Proxy servers / Email / Penet remailer / Pseudonymous remailer / Pseudonymity / Cryptography / Internet / Computing

      Privacy Enhancing Technologies for the Internet III: Ten Years Later∗ Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2007-12-29 13:05:17
      18Social issues / Cypherpunks / Internet privacy / Privacy / Ian Goldberg / Pseudonymity / Anonymous remailer / Anonymity / Internet protocol suite / Cryptography / Ethics / Identity management

      A Pseudonymous Communications Infrastructure for the Internet by Ian Avrum Goldberg B.Math. (University of WaterlooM.Sc. (University of California at Berkeley) 1998

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2000-12-21 17:27:25
      19Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

      Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2011-03-09 14:36:12
      20Computing / Anonymity / Pseudonymity / Tor / Proxy server / Blog / Delfi / Anonymous web browsing / Copyright infringement / Internet privacy / Internet / Cryptography

      Virtues and Perils of Anonymity Virtues and Perils of Anonymity Should Intermediaries Bear the Burden? by Nicolo Zingales,* Assistant Professor, Tilburg Law School. Fellow, Center for Technology and Society, Getulio Var

      Add to Reading List

      Source URL: www.jipitec.eu

      Language: English - Date: 2015-01-26 14:14:01
      UPDATE