Anonymous publication is the act of making publicly available text which cannot be traced to the author unless the text itself identifies (or hints at) the author. ...more on Wikipedia about "Anonymous publication"
In computer security, authentication ( Greek: αυθεντικός, from 'authentes'='author') is the process by which a computer, computer program, or another user attempts to confirm that the computer, computer program, or user from whom the second party has received some communication is, or is not, the claimed first party. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program. ...more on Wikipedia about "Authentication"
Cipherspace is the encrypted (and often pseudonymous or fully anonymous) equivalent to cyberspace. Examples of cipherspaces include Freenet, I2P, and some anonymous mail-forwarding services. ...more on Wikipedia about "Cipherspace"
Confidentiality has been defined by the International Organization for Standardization (ISO) as "ensuring that information is accessible only to those authorized to have access" and is one of the cornerstones of Information security. Confidentiality is one of the design goals for many cryptosystems, made possible in practice by the techniques of modern cryptography. ...more on Wikipedia about "Confidentiality"
Crypto-anarchism is a philosophy that expounds the use of strong public-key cryptography to enforce privacy and therefore individual freedom. Crypto-anarchists aim to create virtual communities where everyone is absolutely anonymous or pseudonymous. ...more on Wikipedia about "Crypto-anarchism"
A crypto-society is an encrypted virtual community. ...more on Wikipedia about "Crypto-society"
Frequency-hopping spread spectrum (FHSS) is a spread-spectrum method of transmitting signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. ...more on Wikipedia about "Frequency-hopping spread spectrum"
Don't hesitate to contact stuff on shortopedia Applications_of_cryptography
In telecommunications, identification, friend or foe (IFF) is an identification system designed for use during hostile conditions, that enables military aircraft, or both civilian and military air-traffic controllers to distinguish friendly aircraft, vehicles, or forces from the enemy, and also to track them. ...more on Wikipedia about "Identification friend or foe"
Pseudonymity is a state of disguised identity resulting from the use of a pseudonym (also called nym). The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities). For example, all of the Federalist Papers were signed by Publius, a pseudonym shared by James Madison, Alexander Hamilton, and John Jay. As this example suggests, most pseudonym holders use pseudonyms because they wish to remain anonymous. But anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name. ...more on Wikipedia about "Pseudonymity"
Traitor tracing is a copy prevention strategy which has been around for years. The main concept is that each licensee (the user) is given an unique key which unlocks the software or allows the media to be decrypted. ...more on Wikipedia about "Traitor tracing"
This article is licensed under the GNU Free Documentation License.
It uses material from the Wikipedia . Direct links to the original articles are in the text.
If you use exact copy or modified of this article you should preserve above paragraph and put also : It uses material from the Shortopedia article about "Applications of cryptography".
|MAIN PAGE||MAIN INDEX||CONTACT US|