TU Dresden

Results: 830



#Item
381

Erschien in: Dieter Klumpp, Herbert Kubicek, Alexander Roßnagel, Wolfgang Schulz (Hg.): Netzwelt – Wege, Werte, Wandel; Springer, Berlin Heidelberg 2010, 245–263 Identitätsmanagement in Netzwelten Sandra Steinbrech

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2009-12-08 08:37:40
    382Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Email / Tor / Cryptography / Internet privacy / Anonymity

    - 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 08:26:00
    383Pseudonymity / Cryptographic software / Crowds / Pseudonym / Public-key cryptography / Email / Tor / Ring signature / Digital credential / Cryptography / Internet privacy / Anonymity

    - 9 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2004-07-21 02:54:56
    384Computer law / Cross-platform software / Open-source software / Proprietary software / Open source software development / Open source / Source code / Debian / Free software / Software licenses / Software / Computing

    - 15 - Appeared in: Computers & Security[removed]471 The Open Source Approach – Opportunities and Limitations

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: English - Date: 2002-09-20 07:46:17
    385

    Microsoft Word - FePf06.doc

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    Language: German - Date: 2006-10-04 08:41:20
      386Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

      Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-16 02:50:25
      387Surveillance / Identification / Hand geometry / Smart card / Biometrics Institute / Biometric points / Security / Biometrics / National security

      Biometrics – How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany [removed]

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2008-09-22 07:43:54
      388Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Digital credential / Cryptography / Internet privacy / Cryptographic software

      Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2004-07-21 02:52:12
      389National security / Surveillance / Fingerprint / Hand geometry / Authentication / Biometrics Institute / Biometric passport / Security / Biometrics / Identification

      1 Biometrics – how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics?

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2008-04-28 04:18:51
      390Cryptographic software / Internet / Software / Pseudonymity / Tor / Cryptography / Internet privacy / Anonymity

      A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.33 April 8, 2010)

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2010-04-08 06:22:32
      UPDATE