Pseudonymity

Results: 113



#Item
41Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2009-12-18 03:56:23
42Identity / Anonymity / Pseudonymity / Crowds / Pseudonym / Public-key cryptography / Privacy-enhancing technologies / Academi / Digital identity / Cryptography / Identity management / Security

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2006-05-29 09:44:06
43Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Email / Tor / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

- 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:02:08
44Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Tor / Email / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

- 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:55:56
45Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.15 and all succeeding versions) Change Histor

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.15 and all succeeding versions) Change Histor

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 03:22:41
46Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-20 02:12:55
47Schwerpunkt  Managing One’’s Identities in Organisational and Social Settings Katrrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, San

Schwerpunkt Managing One’’s Identities in Organisational and Social Settings Katrrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, San

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2007-10-01 10:57:52
48Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:07:30
49Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:10
50Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 11 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:10