Search results

14 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
File Octet Stream Giuseppe D’Acquisto (Garante - Italian DPA)
Located in Events / ULD-ENISA Workshop
File Octet Stream Bud P. Bruegger (ULD - Schleswig-Holstein DPA)
Located in Events / ULD-ENISA Workshop
File Troff document Pseudonymisation Techniques and best practices_IT
Located in Publications
Report/Study ECMAScript program Pseudonymisation techniques and best practices
This report explores further the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice. Starting from a number of pseudonymisation scenarios, the report defines first the main actors that can be involved in the process of pseudonymisation along with their possible roles. It then analyses the different adversarial models and attacking techniques against pseudonymisation, such as brute force attack, dictionary search and guesswork. Moreover, it presents the main pseudonymisation techniques and policies available today.
Located in Publications
File Pseudonymisation Techniques and best practices_FR
Located in Publications
File Frank Wagner (Deutsche Telekom AG)
Located in Events / ULD-ENISA Workshop
File Fabian Prasser (TMF e.V.)
Located in Events / ULD-ENISA Workshop
File C header Patrick von Braunmühl (Bundesdruckerei GmbH)
Located in Events / ULD-ENISA Workshop
ENISA proposes Best Practices and Techniques for Pseudonymisation
The European Union Agency for Cybersecurity (ENISA) published a new report on “Pseudonymisation Techniques and Best Practices”, which explores the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice.
Located in News / ENISA News
File ECMAScript program ULD ENISA workshop notes
Located in Events / ULD-ENISA Workshop

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information