Search results

16 items matching your search terms.
Filter the results.
Item type



























































New items since



Sort by relevance · date (newest first) · alphabetically
File Octet Stream Giuseppe D’Acquisto (Garante - Italian DPA)
Located in Events / ULD-ENISA Workshop
File Octet Stream Bud P. Bruegger (ULD - Schleswig-Holstein DPA)
Located in Events / ULD-ENISA Workshop
File Troff document Pseudonymisation Techniques and best practices_IT
Located in Publications
Report/Study ECMAScript program Data Pseudonymisation: Advanced Techniques and Use Cases
This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare to discuss possible pseudonymisation options in different example cases. Lastly, it examines the application of basic pseudonymisation techniques in common cybersecurity use cases, such as the use of telemetry and reputation systems.
Located in Publications
Report/Study ECMAScript program Pseudonymisation techniques and best practices
This report explores further the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice. Starting from a number of pseudonymisation scenarios, the report defines first the main actors that can be involved in the process of pseudonymisation along with their possible roles. It then analyses the different adversarial models and attacking techniques against pseudonymisation, such as brute force attack, dictionary search and guesswork. Moreover, it presents the main pseudonymisation techniques and policies available today.
Located in Publications
Press Release Cybersecurity to the Rescue: Pseudonymisation for Personal Data Protection
ENISA’s new report explores pseudonymisation techniques and use cases for healthcare and information sharing in cybersecurity
Located in News / ENISA News
File Pseudonymisation Techniques and best practices_FR
Located in Publications
File Frank Wagner (Deutsche Telekom AG)
Located in Events / ULD-ENISA Workshop
File Fabian Prasser (TMF e.V.)
Located in Events / ULD-ENISA Workshop
File C header Patrick von Braunmühl (Bundesdruckerei GmbH)
Located in Events / ULD-ENISA Workshop

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information