Pseudonyms

Results: 24



#Item
1

Pseudonymous Suits in the U.S.A. – An Update Joan Steinman* In 1985, relatively early in the emergence of litigation in the U.S.A. in which parties sought to sue or be sued under fictional names, pseudonyms, I wrote an

Add to Reading List

Source URL: www.iijusticia.edu.ar

Language: English - Date: 2011-05-14 12:26:48
    2Identity management / Internet privacy / Pseudonym / Privacy / Pseudonymity / Digital credential

    (Un)linkable Pseudonyms in Identity Management What is it about? To exchange data between servers, the items have to be linkable. However, to preserve

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    - Date: 2015-12-01 04:00:02
    3

    Liste erstellt amReferences Aktuell Bohannon 2016 John Bohannon, Fight over author pseudonyms could flare again.

    Add to Reading List

    Source URL: axel.berger-odenthal.de

    Language: English - Date: 2016-03-19 11:46:15
      4

      Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington {syhan, vincent, qp, simpeter, tom, arvind, dj

      Add to Reading List

      Source URL: homes.cs.washington.edu

      Language: English - Date: 2013-06-25 18:48:39
        5

        Security and Privacy in Two RFID Deployments, With New Methods For Private Authentication and RFID Pseudonyms by David Alexander Molnar Research Project

        Add to Reading List

        Source URL: www.dmolnar.com

        Language: English - Date: 2009-08-16 02:42:26
          6

          Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms By David Chaum Communications of the ACM February 1981 Volume 24

          Add to Reading List

          Source URL: www.cs.utexas.edu

          Language: English - Date: 2005-09-05 20:19:56
            7Social issues / Navigation / Internet privacy / Pseudonym / Privacy / Location-based service / Technology / Ethics / Identity management / Geolocation

            Protecting Location Privacy with K-Confusing Paths Based on Dynamic Pseudonyms Ken Mano Kazuhiro Minami

            Add to Reading List

            Source URL: systemsresilience.org

            Language: English - Date: 2013-01-29 03:10:52
            8Spamming / Internet ethics / Email / Reputation management / Sybil attack / Anonymity / Online identity / Pseudonymous remailer / Pseudonym / Internet / Computing / Internet privacy

            An Offline Foundation for Online Accountable Pseudonyms Bryan Ford Jacob Strauss

            Add to Reading List

            Source URL: pdos.csail.mit.edu

            Language: English - Date: 2009-11-10 14:15:06
            9Reputation management / Sybil attack / Internet privacy / Anonymity / Spamming / Online identity / Pseudonym / Spam / CAPTCHA / Internet / Computing / Email

            An Offline Foundation for Accountable Pseudonyms Bryan Ford Jacob Strauss MIT CSAIL SocialNets

            Add to Reading List

            Source URL: pdos.csail.mit.edu

            Language: English - Date: 2009-11-10 14:15:06
            10Civil procedure / State court / Federal Rules of Civil Procedure / Case citation / Lawsuit / Discovery / Alien Tort Statute / Interlocutory appeal / Forum non conveniens / Law / Bibliography / Citation signal

            Pseudonymous Suits in the U.S.A. – An Update Joan Steinman* In 1985, relatively early in the emergence of litigation in the U.S.A. in which parties sought to sue or be sued under fictional names, pseudonyms, I wrote an

            Add to Reading List

            Source URL: www.iijusticia.org

            Language: English - Date: 2013-08-08 15:30:37
            UPDATE