Search results

Jump to: navigation, search
  • * April 29, 2020: There is now an exemption to the anonymity period policy for research relating to COVID-19 Anonymity period begins: May 1, 2020<br>
    5 KB (612 words) - 10:41, 2 June 2020
  • ...within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, delegation, group sele **Individual anonymity, group trust, and confidentiality on online groups
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...erations. We are using this process because research indicates that author anonymity reduces bias in reviewing.
    6 KB (967 words) - 22:51, 4 February 2009
  • and bibliographic references must be adjusted to preserve author anonymity. Further details on anonymity requirements are available on the Web page.
    7 KB (851 words) - 05:29, 15 October 2008
  • * Privacy- and anonymity-preserving data analysis
    5 KB (634 words) - 15:36, 14 December 2008
  • | Title = International Workshop on Privacy and Anonymity in the Information Society Data Anonymity
    2 KB (193 words) - 23:10, 14 October 2008
  • - Security, Anonymity & User Privacy
    4 KB (587 words) - 23:30, 14 October 2008
  • * anonymity, pseudonymity
    4 KB (457 words) - 23:13, 14 October 2008
  • * Anonymity, prevention of traffic analysis
    2 KB (291 words) - 23:19, 14 October 2008
  • * Privacy and anonymity technologies.
    5 KB (673 words) - 23:19, 14 October 2008
  • * Privacy, Traceability, and Anonymity * Anonymity and Privacy vs. Accountability
    6 KB (736 words) - 23:20, 14 October 2008
  • * Anonymity and privacy vs. accountability
    4 KB (565 words) - 23:20, 14 October 2008
  • anonymity information warfare commercial and industry security
    5 KB (637 words) - 23:20, 14 October 2008
  • Anonymity and pseudonymity
    2 KB (262 words) - 23:20, 14 October 2008
  • ...ing from the submission. If you believe that any information left out for anonymity may hinder reviewing, such as a citation to the author's thesis, please pro
    5 KB (667 words) - 14:18, 25 November 2016
  • ...the submissions should be double-blind and will be peer-reviewed. Per the anonymity guidelines, you must remove any author names.
    4 KB (514 words) - 12:03, 6 April 2020
  • ...l your identity. However, if you believe that any information left out for anonymity may hinder reviewing, such as a citation to the authors thesis, please prov
    5 KB (678 words) - 20:58, 26 November 2016
  • * Anonymity and privacy
    4 KB (493 words) - 23:34, 14 October 2008
  • Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - Anonymity and privacy vs. accountability - Privacy and anonymity issues in trust negotiation
    5 KB (602 words) - 13:44, 23 January 2009
  • * Anonymity, user privacy, and location privacy in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • - Privacy, anonymity, and trust management
    6 KB (852 words) - 13:02, 18 January 2009
  • o Attribution and identify management; anonymity and ID
    4 KB (557 words) - 16:33, 27 February 2009
  • - Anonymity and Pseudonymity
    8 KB (967 words) - 17:07, 27 February 2009
  • · Privacy and Anonymity
    4 KB (485 words) - 17:07, 27 February 2009
  • - anonymity and medical research - anonymity, pseudonimity and accountability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • - anonymity
    6 KB (828 words) - 17:08, 27 February 2009
  • ...cies for individual domains that are probed or monitored, data privacy and anonymity for all personally identifiable information, and etiquette for using shared
    6 KB (774 words) - 17:08, 27 February 2009
  • CoNLL adheres to the ACL anonymity policy, as described in the May 5, 2020: Anonymity period starts<br>
    3 KB (349 words) - 11:44, 3 August 2020
  • Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality
    6 KB (746 words) - 11:35, 2 August 2009
  • ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;
    14 KB (1,651 words) - 15:56, 15 February 2017
  • -Privacy and anonymity technologies -Privacy and anonymity technologies
    6 KB (766 words) - 10:54, 26 April 2010
  • * Privacy, Traceability, and Anonymity * Anonymity and Privacy vs. Accountability
    4 KB (484 words) - 14:20, 14 December 2009
  • - Anonymity and pseudonymity in business transactions
    7 KB (982 words) - 19:13, 3 January 2010
  • * Anonymity and privacy-aware solutions for Social Search Systems
    6 KB (765 words) - 14:01, 11 April 2010
  • * Anonymity and privacy-aware solutions for Social computing logs mining
    4 KB (600 words) - 19:11, 18 February 2010
  • - Anonymity, user privacy, and location privacy in UE
    3 KB (498 words) - 02:52, 22 December 2012
  • * Anonymity
    4 KB (490 words) - 14:42, 6 November 2020
  • * Privacy-enhancing technologies and anonymity
    3 KB (343 words) - 16:31, 6 May 2020
  • AnonymityAnonymity and pseudonymity
    5 KB (609 words) - 17:01, 5 July 2020
  • - identity management, anonymity
    5 KB (701 words) - 05:52, 14 April 2011
  • * Safety, Security & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; a
    6 KB (910 words) - 12:04, 31 January 2020
  • *Privacy/Anonymity mechanisms in VANETs
    2 KB (233 words) - 06:32, 20 September 2016
  • |Field=computer science, privacy, anonymity
    346 bytes (39 words) - 18:22, 19 December 2016
  • ...In this case we suggest the authors not cite the report, so as to preserve anonymity. ...ritten by the authors must be cited in such a way so as to preserve author anonymity. Differences relative to these earlier papers must be explained in the text
    4 KB (550 words) - 17:28, 13 February 2020
  • -Techniques for anonymity, pseudonymity and unlinkability in linked and
    7 KB (901 words) - 11:13, 16 July 2017
  • • Privacy and Anonymity
    5 KB (626 words) - 12:02, 3 September 2017
  • 10th International Conference on Security, Privacy and Anonymity in Computation,
    3 KB (379 words) - 12:01, 3 September 2017
  • - Information Hiding and Anonymity
    3 KB (380 words) - 12:30, 3 September 2017
  • * Anonymity, security and trust for Web access
    8 KB (1,023 words) - 19:05, 7 March 2020
  • ...e papers, and bibliographic references must be adjusted to preserve author anonymity. Submissions should be uploaded at: https://cmt3.research.microsoft.com/SIG
    4 KB (419 words) - 10:40, 23 February 2020
  • ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli ...responsible for checking that their resulting PDF meets our formatting and anonymity specifications. Submissions not following these guidelines will be rejected
    5 KB (759 words) - 15:21, 18 June 2020
  • ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di
    4 KB (678 words) - 10:00, 17 April 2020
  • * Anonymity and Privacy
    1 KB (152 words) - 10:13, 17 April 2020
  • - Anonymity and pseudonymity
    5 KB (690 words) - 12:02, 26 March 2020
  • * Communication Privacy and Anonymity
    2 KB (299 words) - 13:10, 30 March 2020
  • ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli
    5 KB (732 words) - 15:22, 18 June 2020
  • ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli
    6 KB (944 words) - 15:24, 18 June 2020
  • ...ty of the authors during the initial phase of the review process, however, anonymity will expire after the majority of the reviews have been submitted and preli
    5 KB (721 words) - 10:07, 17 August 2023
  • * Privacy and anonymity technologies
    2 KB (208 words) - 10:19, 9 April 2020
  • ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di
    7 KB (1,057 words) - 10:13, 17 April 2020
  • * Privacy and anonymity technologies
    2 KB (195 words) - 11:08, 9 April 2020
  • - Privacy and anonymity technologies ...actions on Information and Systems - Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications (pending acceptance of
    3 KB (445 words) - 11:59, 9 April 2020
  • ...ver the authors if they were to try. Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more di
    8 KB (1,080 words) - 10:43, 17 April 2020
  • * Anonymity and Privacy
    1 KB (155 words) - 10:20, 17 April 2020
  • * Anonymity and Privacy
    1 KB (153 words) - 10:27, 17 April 2020
  • * IT security, intellectual property and personal anonymity in open innovation
    6 KB (748 words) - 10:02, 30 April 2020
  • ...the same way one would reference work by others. If necessary to maintain anonymity, citations may be shown as “Removed for blind review,” but consider tha
    11 KB (1,541 words) - 15:35, 18 June 2020
  • ...peration; Privacy, identify, security on online communications; Individual anonymity, group trust, and confidentiality on online groups; Conflict, delegation, g
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled
    5 KB (691 words) - 11:40, 11 June 2020
  • ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled
    6 KB (720 words) - 12:20, 11 June 2020
  • ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled
    5 KB (670 words) - 09:42, 12 June 2020
  • ...Please read the Example Paper for detailed instructions on how to preserve anonymity. Avoid providing information that may identify the authors in the acknowled
    6 KB (784 words) - 12:58, 15 June 2020
  • ...or cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detect ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...ards, identification and trust methodologies; Certification, accreditation anonymity, and audit; Security management, emergency contingency planning, identify t
    13 KB (1,636 words) - 11:51, 10 July 2020
  • ...Access Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods; Anti-ma
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...ied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protect
    18 KB (2,036 words) - 02:36, 10 July 2020
  • Privacy and anonymity ...nformation retrieval, social networks, etc./; Legal aspects in privacy and anonymity
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...for smart devices; Security for mobile applications; Anonymity and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and hum Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * Communication Privacy and Anonymity
    3 KB (326 words) - 09:35, 10 September 2020
  • * Communication Privacy and Anonymity
    3 KB (336 words) - 09:51, 10 September 2020
  • ...or cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detect ...ent; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols;
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...ce; Certification, public key infrastructures, data integrity; Privacy and anonymity
    11 KB (1,325 words) - 15:01, 18 February 2021
  • anonymity and pseudonymity; identity and trust management, biometric
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...peration; Privacy, identify, security on online communications; Individual anonymity, group trust, and confidentiality on online groups; Conflict, delegation, g
    15 KB (1,921 words) - 01:00, 12 December 2020
  • * • Anonymity & Pseudonymity
    2 KB (197 words) - 17:40, 11 February 2021
  • ...). In this case, the authors should not cite the report, so as to preserve anonymity. ...). In this case, the authors should not cite the report, so as to preserve anonymity.
    37 KB (5,185 words) - 11:25, 3 August 2023
  • Communication Privacy and Anonymity,
    4 KB (517 words) - 04:36, 29 June 2023
  • ...). In this case, the authors should not cite the report, so as to preserve anonymity.
    7 KB (951 words) - 04:25, 5 September 2023