Levels of Anonymity

@article{Flinn1995LevelsOA,
  title={Levels of Anonymity},
  author={Bill Flinn and Hermann A. Maurer},
  journal={J. UCS},
  year={1995},
  volume={1},
  pages={35-47}
}
In this paper we make a rst attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identiied by means of a password" or "anonymous use" there are many other levels of anonymity, identiication and authenticity necessary in various applications. 

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Lecturing Technology { A Future with Hypermedia, to appear in: Educational Technology

J Lennon, H Lennon, Maurer
Lecturing Technology { A Future with Hypermedia, to appear in: Educational Technology • 1994

Time Magazine: Who Should Keep The Keys?

Time Time Magazin March • 1994

The Impact of Electronic Meeting Systems on New Zealand Organisations

J Sheeeld, Sheeeld
Proceedings of the 13th New Zealand Computer Society Conference • 1993

EATCS Monographs

A Salomaa, Salomaa
EATCS Monographs • 1990

The Strange Case of the Electronic Lover, Ms Magazine

Van Gelder 85 ] Lindsy Van Gelder
The Strange Case of the Electronic Lover, Ms Magazine • 1985

Verstaendigung im machtfreien Raum

P Visotschnigg, Visotschnigg
Verstaendigung im machtfreien Raum • 1985

Rozsenich, and I. Sebestyen : Videotex without "Big Brother

H A Maurer, N Maurer
Electronic Publishing Review • 1984

Similar Papers

Loading similar papers…