TU Dresden

Results: 830



#Item
431

Microsoft Word - Alcatel IDM April 2005 final2.doc

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: German - Date: 2006-08-21 09:17:55
    432

    PDF Document

    Add to Reading List

    Source URL: dud.inf.tu-dresden.de

    - Date: 2006-03-22 05:30:00
      433National security / Surveillance / Private biometrics / Fingerprint / Authentication / Hand geometry / Biometrics Institute / Biometric passport / Biometrics / Security / Identification

      1 Biometrics – how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics?

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: English - Date: 2008-09-22 07:43:14
      434

      Microsoft Word - Der ePass - innovativ aber ein Sicherheitsrisiko iX Okt 2007.doc

      Add to Reading List

      Source URL: dud.inf.tu-dresden.de

      Language: German - Date: 2007-10-05 03:49:54
        435Privacy / Social issues / Identity / Human rights / Privacy-enhancing technologies / Pseudonymity / Internet privacy / Information privacy / P3P / Identity management / Ethics / Cryptography

        IPT2E676[removed]:38 Uhr Privacy-Enhancing Identity Management Sebastian Clauß, Andreas Pfitzmann, Dresden University of Technology , Marit Hansen , Independent Centre for Privacy

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-01-13 08:52:16
        436Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

        Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-07-09 03:55:01
        437Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

        Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2004-07-21 08:25:56
        438Public-key cryptography / Academi / Cryptography / Anonymity / Pseudonymity

        DOC Document

        Add to Reading List

        Source URL: dud.inf.tu-dresden.de

        Language: English - Date: 2008-02-15 04:36:42
        439

        I T A L I E N -Z E N T R U M STREITGESPRÄCH http://tu-dresden.de/slk/iz Modell Deutschland? Die Krise in Italien und Europa

        Add to Reading List

        Source URL: www.dijv.org

        - Date: 2014-11-19 07:57:47
          440Earth / Earth sciences graphics software / NetCDF / Köppen climate classification / Geographic information system / Web Processing Service / Wladimir Köppen / Atmospheric sciences / Meteorology / Climate

          SDI components for ad-hoc analysis of climatological time-series data Mario Härtwig TU Dresden Geoinformation Systems[removed]Dresden [removed]

          Add to Reading List

          Source URL: www.agile-online.org

          Language: English - Date: 2013-05-06 15:36:24
          UPDATE