TU Dresden

Results: 830



#Item
341

Strategische Fahrplanung bei Deutsche Bahn Netze Öffentlicher Gastvortrag von Prof. Dr. Karl Nachtigall der TU Dresden Montag, 23. Februar 2015, 13.30 – 14.30 Uhr

Add to Reading List

Source URL: www.ivt.ethz.ch

- Date: 2015-02-02 09:44:03
    342

    Microsoft Word - FCT_Technical guidelines_2.docx

    Add to Reading List

    Source URL: openaccess.tu-dresden.de

    Language: English - Date: 2014-04-16 05:49:16
      343Software development process / Object-oriented programming / Education in Uttar Pradesh / Uttar Pradesh Technical University / Science / Software development / Ajay Kumar Garg Engineering College / IBM Rational Unified Process / Formal methods / Project management / Software engineering

      Experience in Early and Late Software Engineering Project Courses Birgit Demuth, Mike Fischer and Heinrich Hussmann Department of Computer Science Dresden University of Technology D[removed]Dresden, Germany

      Add to Reading List

      Source URL: st.inf.tu-dresden.de

      Language: English - Date: 2008-09-23 10:08:13
      344Public-key cryptography / Cryptography / Anonymity / Pseudonymity

      DOC Document

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2010-08-10 05:10:14
      345Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

      DOC Document

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2006-02-20 03:56:29
      346Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

      DOC Document

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2009-12-18 03:56:23
      347Identity / Anonymity / Pseudonymity / Crowds / Pseudonym / Public-key cryptography / Privacy-enhancing technologies / Academi / Digital identity / Cryptography / Identity management / Security

      DOC Document

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2006-05-29 09:44:06
      348Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Email / Tor / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

      - 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 08:02:08
      349Pseudonymity / Cryptographic software / Pseudonym / Public-key cryptography / Tor / Email / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

      - 8 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 02:55:56
      350Computing / Cryptographic software / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Troll / Cryptography / Internet / Internet privacy

      Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.15 and all succeeding versions) Change Histor

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-16 03:22:41
      UPDATE