Dud

Results: 174



#Item
71Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity Ð A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:48:34
72

in: Alexander Roßnagel (Hrsg.): Allgegenwärtige Identifizierung? Neue Identitätsinfrastrukturen und ihre rechtliche Gestaltung; Schriftenreihe des Instituts für Europäisches Medienrecht (EMR), Saarbrücken, Band 33;

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2006-08-21 05:24:26
    73

    1 Werden biometrische Sicherheitstechnologien die heutige IT-Sicherheitsdebatte vor neue Herausforderungen

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: German - Date: 2005-05-09 09:50:07
      74

      18      Hannes Federrath, Andreas Pfitzmann IT-Sicherheit      19 Erschien in: Martin Wind, Detlef Kröger (Hrsg.): Handbuch IT in der Verwaltung; Springer-Verlag, Berlin Heidelberg 2006, Seite[removed]IT-S

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: German - Date: 2006-10-04 08:40:54
        75Cryptographic software / Pseudonymity / Tor / Privacy-enhancing technologies / Cryptography / Internet privacy / Anonymity

        Microsoft Word - Anon_Terminology_v0.27.doc

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2006-02-20 03:57:33
        76Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Tor / Email / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

        - 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-07-21 08:19:46
        77

        Alexander Roßnagel, Andreas Pfitzmann: Der Beweiswert von E-Mail; NJW (Neue Juristische Wochenschrift[removed]April[removed]. Ronald Aigner, Henrike Berthold, Elke Franz, Steffen Göbel, Hermann Härtig, Hein

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        - Date: 2005-12-20 10:56:21
          78Internet privacy / Privacy / Secure communication / Cryptography / Security / Anonymity / Pseudonymity / Communication

          Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeed

          Add to Reading List

          Source URL: dud.inf.tu-dresden.de

          Language: English - Date: 2005-07-28 09:24:36
          79Computer-mediated communication / Spamming / Public-key cryptography / Cryptographic protocols / Spam filtering / Simple Mail Transfer Protocol / Email / Computing / Internet

          Efficiency Improvements of the Private Message Service Oliver Berthold, Sebastian Clauß, Stefan K¨opsell, and Andreas Pfitzmann Technische Universit¨ at Dresden Institute for System Architecture

          Add to Reading List

          Source URL: dud.inf.tu-dresden.de

          Language: English - Date: 2004-01-13 08:52:48
          80Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Digital identity / Tor / Public-key cryptography / Email / Cryptography / Identity / Internet privacy

          - 19 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

          Add to Reading List

          Source URL: dud.inf.tu-dresden.de

          Language: English - Date: 2004-09-03 03:58:40
          UPDATE