Search results
Create the page "Anonymity" on this wiki! See also the search results found.
- * April 29, 2020: There is now an exemption to the anonymity period policy for research relating to COVID-19 Anonymity period begins: May 1, 2020<br>5 KB (612 words) - 10:41, 2 June 2020
- ...within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, delegation, group sele **Individual anonymity, group trust, and confidentiality on online groups18 KB (2,408 words) - 02:37, 16 December 2008
- ...erations. We are using this process because research indicates that author anonymity reduces bias in reviewing.6 KB (967 words) - 22:51, 4 February 2009
- and bibliographic references must be adjusted to preserve author anonymity. Further details on anonymity requirements are available on the Web page.7 KB (851 words) - 05:29, 15 October 2008
- * Privacy- and anonymity-preserving data analysis5 KB (634 words) - 15:36, 14 December 2008
- | Title = International Workshop on Privacy and Anonymity in the Information Society Data Anonymity2 KB (193 words) - 23:10, 14 October 2008
- - Security, Anonymity & User Privacy4 KB (587 words) - 23:30, 14 October 2008
- * anonymity, pseudonymity4 KB (457 words) - 23:13, 14 October 2008
- * Anonymity, prevention of traffic analysis2 KB (291 words) - 23:19, 14 October 2008
- * Privacy and anonymity technologies.5 KB (673 words) - 23:19, 14 October 2008
- * Privacy, Traceability, and Anonymity * Anonymity and Privacy vs. Accountability6 KB (736 words) - 23:20, 14 October 2008
- * Anonymity and privacy vs. accountability4 KB (565 words) - 23:20, 14 October 2008
- anonymity information warfare commercial and industry security5 KB (637 words) - 23:20, 14 October 2008
- Anonymity and pseudonymity2 KB (262 words) - 23:20, 14 October 2008
- ...ing from the submission. If you believe that any information left out for anonymity may hinder reviewing, such as a citation to the author's thesis, please pro5 KB (667 words) - 14:18, 25 November 2016
- ...the submissions should be double-blind and will be peer-reviewed. Per the anonymity guidelines, you must remove any author names.4 KB (514 words) - 12:03, 6 April 2020
- ...l your identity. However, if you believe that any information left out for anonymity may hinder reviewing, such as a citation to the authors thesis, please prov5 KB (678 words) - 20:58, 26 November 2016
- * Anonymity and privacy4 KB (493 words) - 23:34, 14 October 2008
- Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality13 KB (1,617 words) - 19:03, 24 November 2008
- - Anonymity and privacy vs. accountability - Privacy and anonymity issues in trust negotiation5 KB (602 words) - 13:44, 23 January 2009
- * Anonymity, user privacy, and location privacy in UE6 KB (793 words) - 15:12, 1 October 2020
- * Privacy, security, ethics, culture, and anonymity issues6 KB (767 words) - 13:01, 18 January 2009
- - Privacy, anonymity, and trust management6 KB (852 words) - 13:02, 18 January 2009
- o Attribution and identify management; anonymity and ID4 KB (557 words) - 16:33, 27 February 2009
- - Anonymity and Pseudonymity8 KB (967 words) - 17:07, 27 February 2009
- · Privacy and Anonymity4 KB (485 words) - 17:07, 27 February 2009
- - anonymity and medical research - anonymity, pseudonimity and accountability12 KB (1,690 words) - 17:08, 27 February 2009
- - anonymity6 KB (828 words) - 17:08, 27 February 2009
- ...cies for individual domains that are probed or monitored, data privacy and anonymity for all personally identifiable information, and etiquette for using shared6 KB (774 words) - 17:08, 27 February 2009
- CoNLL adheres to the ACL anonymity policy, as described in the May 5, 2020: Anonymity period starts<br>3 KB (349 words) - 11:44, 3 August 2020
- Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality6 KB (746 words) - 11:35, 2 August 2009
- ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;14 KB (1,651 words) - 15:56, 15 February 2017
- -Privacy and anonymity technologies -Privacy and anonymity technologies6 KB (766 words) - 10:54, 26 April 2010
- * Privacy, Traceability, and Anonymity * Anonymity and Privacy vs. Accountability4 KB (484 words) - 14:20, 14 December 2009
- - Anonymity and pseudonymity in business transactions7 KB (982 words) - 19:13, 3 January 2010
- * Anonymity and privacy-aware solutions for Social Search Systems6 KB (765 words) - 14:01, 11 April 2010
- * Anonymity and privacy-aware solutions for Social computing logs mining4 KB (600 words) - 19:11, 18 February 2010
- - Anonymity, user privacy, and location privacy in UE3 KB (498 words) - 02:52, 22 December 2012
- * Anonymity4 KB (490 words) - 14:42, 6 November 2020
- * Privacy-enhancing technologies and anonymity3 KB (343 words) - 16:31, 6 May 2020
- • Anonymity • Anonymity and pseudonymity5 KB (609 words) - 17:01, 5 July 2020
- - identity management, anonymity5 KB (701 words) - 05:52, 14 April 2011
- * Safety, Security & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; a6 KB (910 words) - 12:04, 31 January 2020
- *Privacy/Anonymity mechanisms in VANETs2 KB (233 words) - 06:32, 20 September 2016
- |Field=computer science, privacy, anonymity346 bytes (39 words) - 18:22, 19 December 2016
- ...In this case we suggest the authors not cite the report, so as to preserve anonymity. ...ritten by the authors must be cited in such a way so as to preserve author anonymity. Differences relative to these earlier papers must be explained in the text4 KB (550 words) - 17:28, 13 February 2020
- -Techniques for anonymity, pseudonymity and unlinkability in linked and7 KB (901 words) - 11:13, 16 July 2017
- • Privacy and Anonymity5 KB (626 words) - 12:02, 3 September 2017
- 10th International Conference on Security, Privacy and Anonymity in Computation,3 KB (379 words) - 12:01, 3 September 2017
- - Information Hiding and Anonymity3 KB (380 words) - 12:30, 3 September 2017
- * Anonymity, security and trust for Web access8 KB (1,023 words) - 19:05, 7 March 2020
- ...e papers, and bibliographic references must be adjusted to preserve author anonymity. Submissions should be uploaded at: https://cmt3.research.microsoft.com/SIG4 KB (419 words) - 10:40, 23 February 2020
- ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli ...responsible for checking that their resulting PDF meets our formatting and anonymity specifications. Submissions not following these guidelines will be rejected5 KB (759 words) - 15:21, 18 June 2020
- ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di4 KB (678 words) - 10:00, 17 April 2020
- * Anonymity and Privacy1 KB (152 words) - 10:13, 17 April 2020
- - Anonymity and pseudonymity5 KB (690 words) - 12:02, 26 March 2020
- * Communication Privacy and Anonymity2 KB (299 words) - 13:10, 30 March 2020
- ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli5 KB (732 words) - 15:22, 18 June 2020
- ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli6 KB (944 words) - 15:24, 18 June 2020
- ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli5 KB (721 words) - 10:07, 17 August 2023
- * Privacy and anonymity technologies2 KB (208 words) - 10:19, 9 April 2020
- ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di7 KB (1,057 words) - 10:13, 17 April 2020
- * Privacy and anonymity technologies2 KB (195 words) - 11:08, 9 April 2020
- - Privacy and anonymity technologies ...actions on Information and Systems - Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications (pending acceptance of3 KB (445 words) - 11:59, 9 April 2020
- ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di8 KB (1,080 words) - 10:43, 17 April 2020
- * Anonymity and Privacy1 KB (155 words) - 10:20, 17 April 2020
- * Anonymity and Privacy1 KB (153 words) - 10:27, 17 April 2020
- * IT security, intellectual property and personal anonymity in open innovation6 KB (748 words) - 10:02, 30 April 2020
- ...the same way one would reference work by others. If necessary to maintain anonymity, citations may be shown as “Removed for blind review,” but consider tha11 KB (1,541 words) - 15:35, 18 June 2020
- ...peration; Privacy, identify, security on online communications; Individual anonymity, group trust, and confidentiality on online groups; Conflict, delegation, g14 KB (1,804 words) - 13:49, 5 June 2020
- ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled5 KB (691 words) - 11:40, 11 June 2020
- ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled6 KB (720 words) - 12:20, 11 June 2020
- ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled5 KB (670 words) - 09:42, 12 June 2020
- ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled6 KB (784 words) - 12:58, 15 June 2020
- ...or cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detect ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;17 KB (2,088 words) - 12:49, 14 June 2020
- ...ards, identification and trust methodologies; Certification, accreditation anonymity, and audit; Security management, emergency contingency planning, identify t13 KB (1,636 words) - 11:51, 10 July 2020
- ...Access Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods; Anti-ma13 KB (1,550 words) - 02:20, 10 July 2020
- ...ied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protect18 KB (2,036 words) - 02:36, 10 July 2020
- Privacy and anonymity ...nformation retrieval, social networks, etc./; Legal aspects in privacy and anonymity10 KB (1,232 words) - 16:20, 22 March 2021
- ...for smart devices; Security for mobile applications; Anonymity and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and hum Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality15 KB (1,886 words) - 16:16, 25 August 2020
- * Communication Privacy and Anonymity3 KB (326 words) - 09:35, 10 September 2020
- * Communication Privacy and Anonymity3 KB (336 words) - 09:51, 10 September 2020
- ...or cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detect ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;17 KB (2,035 words) - 14:45, 18 February 2021
- ...ce; Certification, public key infrastructures, data integrity; Privacy and anonymity11 KB (1,325 words) - 15:01, 18 February 2021
- anonymity and pseudonymity; identity and trust management, biometric13 KB (1,607 words) - 19:32, 30 November 2020
- ...peration; Privacy, identify, security on online communications; Individual anonymity, group trust, and confidentiality on online groups; Conflict, delegation, g15 KB (1,921 words) - 01:00, 12 December 2020
- * • Anonymity & Pseudonymity2 KB (197 words) - 17:40, 11 February 2021
- ...). In this case, the authors should not cite the report, so as to preserve anonymity. ...). In this case, the authors should not cite the report, so as to preserve anonymity.37 KB (5,185 words) - 11:25, 3 August 2023
- Communication Privacy and Anonymity,4 KB (517 words) - 04:36, 29 June 2023
- ...). In this case, the authors should not cite the report, so as to preserve anonymity.7 KB (951 words) - 04:25, 5 September 2023