Pseudonymity

Results: 113



#Item
31Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project [removed]  Nick Mathewson

Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project [removed] Nick Mathewson

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2010-06-20 23:26:50
32Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley {iang,daw,brewer}@cs.berkeley.edu 1997 Abstract:

Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley {iang,daw,brewer}@cs.berkeley.edu 1997 Abstract:

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-12 22:52:59
33Reputation in Privacy Enhancing T echnologies Technologies Roger Dingledine, Nick Mathewson, and Reputation Technologies, Inc.

Reputation in Privacy Enhancing T echnologies Technologies Roger Dingledine, Nick Mathewson, and Reputation Technologies, Inc.

Add to Reading List

Source URL: www.cfp2002.org

Language: English - Date: 2002-04-15 12:56:55
34Getting to Know You: Using Hostility to Reduce Anonymity in Online Communication Patricia G. Lange San José State University

Getting to Know You: Using Hostility to Reduce Anonymity in Online Communication Patricia G. Lange San José State University

Add to Reading List

Source URL: studentorgs.utexas.edu

Language: English - Date: 2006-10-15 15:18:33
35part iii anonymity 438 anonymity  Building on our investigation of the various concepts and technologies pertaining to identity and identification in Part II, Part III offers a snapshot of the laws

part iii anonymity 438 anonymity Building on our investigation of the various concepts and technologies pertaining to identity and identification in Part II, Part III offers a snapshot of the laws

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-04-03 20:03:02
3622. exit node repudiation for anonymity networks jeremy clark, philippe gauvin, and carlisle adams Introduction 399 Preliminaries 400

22. exit node repudiation for anonymity networks jeremy clark, philippe gauvin, and carlisle adams Introduction 399 Preliminaries 400

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-03-27 16:31:45
3728. anonymity and the law in italy giusella finocchiaro Introduction 523 Anonymity under Italian Law 523 A. Anonymity Defined 523 B. Does a Right to Anonymity Exist under Italian Law? 526

28. anonymity and the law in italy giusella finocchiaro Introduction 523 Anonymity under Italian Law 523 A. Anonymity Defined 523 B. Does a Right to Anonymity Exist under Italian Law? 526

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-03-27 16:30:57
38NRL Release Number[removed]Reputation in Privacy Enhancing T echnologies Technologies Roger Dingledine, Nick Mathewson, and

NRL Release Number[removed]Reputation in Privacy Enhancing T echnologies Technologies Roger Dingledine, Nick Mathewson, and

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:25:06
39Public-key cryptography / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2010-08-10 05:10:14
40Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-02-20 03:56:29