Results 51 to 60 of about 1,117 (109)

Privacy in Mobile Agent Systems: Untraceability [PDF]

open access: yes, 2007
Agent based Internet environments are an interesting alternative to existing approaches of building software systems. The enabling feature of agents is that they allow software development based on the abstraction (a "metaphor") of elements of the real ...
LESZCZYNA RAFAL
core  

Survival of the Cryptic [PDF]

open access: yes, 2017
Should we have privacy for the weak and transparency for the powerful? Sarah Myers West reminds us that we've been agonizing over this question since at least the 1990s, when the cypherpunks first started discussing ...
West, Sarah Myers
core  

The Social Construction of a Secure, Anonymous Electronic Payment System: Frame Alignment and Mobilization around Ecash [PDF]

open access: yes
This paper examines public discourse in order to illuminate the processes by which issues of anonymity, surveillance, security, and privacy are integrated into public understandings of, and interactions with, consumer payment systems.
Phillips, David J.
core   +2 more sources

Contracts Ex Machina [PDF]

open access: yes, 2017
Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled ...
Kevin Werbach, Nicolas Cornell
core   +1 more source

\u3cem\u3eCypherpunks: Freedom and the Future of the Internet\u3c/em\u3e and \u3cem\u3eThe Snowden Files\u3c/em\u3e [PDF]

open access: yes, 2015
The continuing saga of WikiLeaks and the fate of Edward Snowden remain a story of conflicting viewpoints. Those interested in exploring the reasoning behind such hacking and exposure will find that Cypherpunks supplies the background and philosophy of ...
Anderson, Judy
core   +1 more source

El dinero, creación y destrucción [PDF]

open access: yes, 2015
Universidad de Sevilla.
Soto López, Ignacio
core  

Tor:From the Dark Web to the Future of Privacy [PDF]

open access: yes
A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internet's core.Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the ...
Collier, Ben
core   +2 more sources

A trajetória cypherpunk e suas práticas discursivas

open access: yesRevista Eco-Pós, 2016
O texto traz a análise de um tipo específico de ciberativismo denominado cypherpunk. Ele  ganhou destaque mundial principalmente a partir das denuncias realizadas pelo Wikileaks, obtendo ainda mais força após as revelações de Edward Snowden, o ex-agente da inteligência dos Estados Unidos que divulgou detalhes sobre o sistema de vigilância massiva ...
openaire   +1 more source

Blockchain Owns You : From Cypherpunk to Self-Sovereign Identity

open access: yes, 2022
©2022 The Rowman & Littlefield Publishing Group. All rights reserved. Please contact the publisher for permission to copy, distribute or reprint. ; fi=vertaisarvioitu|en=peerReviewed|
openaire   +1 more source

More than words: навчально-методичні рекомендації з курсу «Практикум перекладу» [PDF]

open access: yes, 2013
Навчально-методичні рекомендації розраховані на студентів 4 року навчання Інституту філології та журналістики, які поглиблено вивчають англійську мову. Видання містить вправи та тексти як для самостійного письмового перекладу вдома, так і для спонтанного
Smalko, L. Y.   +3 more
core  

Home - About - Disclaimer - Privacy