Chaum / VARIOUS PSEUDONYM SYSTEMS / A. Pseudonym Systems / Nymble / SP / /
Continent
Africa / / /
Event
FDA Phase / /
Facility
Computer Science University of Waterloo Waterloo / /
IndustryTerm
semi-trusted infrastructure / high-bandwidth Internet connections / authentication protocol / Internet Registry / anonymous revocation systems / anonymous blacklisting solutions / online relays / sister site / privacy-conscious Internet users / anonymous communications network / probabilistic polynomial-time algorithms / revocable anonymous credential systems / ordinary Internet users / closed online community / online chat rooms / online forums / communications networks / lightweight solution / anonymity systems / Internet connection / revocation protocol / anonymous access to its services / blacklist audit protocol / deployed anonymous communications network / real-world applications / Online forum software / directory server / Internet services transition / anonymous communications networks / pseudonym systems / registration protocol / online communities / e-passport / Internet Protocol / token extraction protocol / anonymous blacklisting systems / objective blacklisting systems / trusted computing / to pseudonym systems / online experiences / Internet users / online subscription services / existing anonymous blacklisting systems / focused on using anonymous blacklisting systems / /
Organization
Ian Goldberg Cheriton School / Computer Science University of Waterloo Waterloo / /
Person
Wikipedia / Roger Dingledine / Ryan Henry / Ian Goldberg / /
Position
malicious PM / driver / Prime Minister / Revocation Manager / Enhanced Driver / member of a group / Manager / Credential Manager / Group Manager / model / Pseudonym Manager / /
Product
SP0 / BSP0 / /
ProvinceOrState
New Mexico / /
Technology
authentication protocol / IPv6 / Public Key Infrastructure / SMS / revocation protocol / PKI / availability problems.14 A. Internet Protocol / private key / registration protocol / encryption / blacklist audit protocol / public key / token extraction protocol / Keywords-privacy enhancing technologies / IPv4 / This protocol / five probabilistic polynomial-time algorithms / ubiquitous Network Time Protocol / /