-
1
-
-
1642335071
-
On secure and pseudonymous client-relationships with multiple servers
-
Bleichenbacher, D., Gabber, E., Gibbons, P., Matias, Y. and Mayer, A. (1998), "On secure and pseudonymous client-relationships with multiple servers", Proceedings of the 3rd USENIX Workshop on Electronic Commerce, USA.
-
(1998)
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, USA
-
-
Bleichenbacher, D.1
Gabber, E.2
Gibbons, P.3
Matias, Y.4
Mayer, A.5
-
2
-
-
0038752605
-
-
Information and Privacy Commission, April
-
Borking, J., van Eck, B. and Siepel, P. (1999), Intelligent Software Agents: Turning a Privacy Threat into a Privacy Protector, Information and Privacy Commission, April.
-
(1999)
Intelligent Software Agents: Turning a Privacy Threat into a Privacy Protector
-
-
Borking, J.1
Van Eck, B.2
Siepel, P.3
-
3
-
-
85039578158
-
Building a privacy guardian for the electronic age
-
IST/PISA project, Deliverable D10
-
Cartrysse, K., Lubbe, J. and Kabasele, J. (2001), "Building a privacy guardian for the electronic age", IST/PISA project, Deliverable D10, available at: http://pet-pisa.openspace.nl/pisa_org/pisa/pisa_project_deliverables.html
-
(2001)
-
-
Cartrysse, K.1
Lubbe, J.2
Kabasele, J.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Chaum, D. (1981), "Untraceable electronic mail, return addresses and digital pseudonyms", Communications of the ACM, Vol. 24 No. 2.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
5
-
-
9144236670
-
Showing credentials without identification transferring signatures between unconditionally un-linkable pseudonyms
-
Chaum, D. (1990), "Showing credentials without identification transferring signatures between unconditionally un-linkable pseudonyms", Advances in Cryptology (USCRYPT '90), January.
-
(1990)
Advances in Cryptology (USCRYPT '90), January
-
-
Chaum, D.1
-
6
-
-
84866820721
-
The legal context of privacy-enhancing and privacy-sympathetic technologies
-
The Australian National University
-
Clarke, R. (2001), "The legal context of privacy-enhancing and privacy-sympathetic technologies", The Australian National University, available at: www.anu.edu.au/people/Roger.Clarke/DV/Florham.html
-
(2001)
-
-
Clarke, R.1
-
7
-
-
84945587653
-
The solar trust model: Authentication without limitation
-
Clifford, M., Lavine, C. and Bishop, M. (1998), "The solar trust model: authentication without limitation", Proceedings of the Annual Computer Security Applications Conference, USA.
-
(1998)
Proceedings of the Annual Computer Security Applications Conference, USA
-
-
Clifford, M.1
Lavine, C.2
Bishop, M.3
-
8
-
-
0006917446
-
Internet privacy
-
Cranor, L. (1999), "Internet privacy", Communications of the ACM, Vol. 42 No. 2, pp. 29-66.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 29-66
-
-
Cranor, L.1
-
9
-
-
85039588266
-
-
August, Data Protection Commission of The Netherlands
-
Data Protection Commission of The Netherlands (1995), Privacy-Enhancing Technologies: The Path to Anonymity, Vol. 2, August, Data Protection Commission of The Netherlands.
-
(1995)
Privacy-Enhancing Technologies: The Path to Anonymity
, vol.2
-
-
-
10
-
-
0000964378
-
Flood control on the information ocean: Living with anonymity, digital cash and distributed databases
-
Froomkin, M. (1996), "Flood control on the information ocean: living with anonymity, digital cash and distributed databases", Pittsburgh Journal of Law and Commerce, p. 395.
-
(1996)
Pittsburgh Journal of Law and Commerce
, pp. 395
-
-
Froomkin, M.1
-
11
-
-
54649083230
-
TAZ servers and the rewebber network: Enabling anonymous publishing on the WWW
-
Goldberg, I. and Wagner, D. (1998), "TAZ servers and the rewebber network: enabling anonymous publishing on the WWW", First Monday Peer Reviewed Journal on The Internet, Vol. 3, No. 4.
-
(1998)
First Monday Peer Reviewed Journal on The Internet
, vol.3
, Issue.4
-
-
Goldberg, I.1
Wagner, D.2
-
12
-
-
0030644696
-
Privacy-enhancing technologies for the internet
-
Goldberg, I., Wagner, D. and Brewer, E. (1997), "Privacy-enhancing technologies for the Internet", Proceedings of IEEE COMPCON '97 Conference, February, available at: www.cs.berkeley.edu/~daw/papers/privacy-compcon97-www/privacy-html
-
(1997)
Proceedings of IEEE COMPCON '97 Conference, February
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
13
-
-
85039581624
-
Secure deletion of data from magnetic and solid-state memory
-
Goodman, P. (1996), "Secure deletion of data from magnetic and solid-state memory", Proceedings of the USENIX Security Symposium, USA, available at: www.usenix.org/publications/library/proceedings/sec96/full_papers/gutmann/
-
(1996)
Proceedings of the USENIX Security Symposium, USA
-
-
Goodman, P.1
-
14
-
-
1642374232
-
A privacy-enhancing e-business model based on infomediaries
-
Gritzalis, D., Moulinos, K. and Kostis, K. (2001), "A privacy-enhancing e-business model based on infomediaries", Proceedings of the Workshop on Mathematical Methods, Models, and Architectures for Computer Networks Security, Russia.
-
(2001)
Proceedings of the Workshop on Mathematical Methods, Models, and Architectures for Computer Networks Security, Russia
-
-
Gritzalis, D.1
Moulinos, K.2
Kostis, K.3
-
15
-
-
0043249777
-
Securing the electronic market: The KEYSTONE public key infrastructure architecture
-
Gritzalis, S., Katsikas, S., Lekkas, D., Moulinos, K. and Polydorou, E. (2000), "Securing the electronic market: the KEYSTONE Public Key Infrastructure architecture", Computers & Security, Vol. 19 No. 8, pp. 731-46.
-
(2000)
Computers & Security
, vol.19
, Issue.8
, pp. 731-746
-
-
Gritzalis, S.1
Katsikas, S.2
Lekkas, D.3
Moulinos, K.4
Polydorou, E.5
-
16
-
-
85039584388
-
-
August
-
Information and Privacy Commission (1995), Privacy-Enhancing Technologies: The Path to Anonymity, Vol. 1, August, Information and Privacy Commission, Ontario, available at: www.ipc.on.ca/english/pubpres/papers/anon-e.htm
-
(1995)
Privacy-Enhancing Technologies: The Path to Anonymity
, vol.1
-
-
-
17
-
-
3242742592
-
Addressing anonymous messages in cyberspace
-
June
-
Lee, G. (1996), "Addressing anonymous messages in cyberspace", Journal of Computer-Mediated Communication, Vol. 2, June, available at: www.ascusc.org/jcmc/vol2/issue1/anon.html
-
(1996)
Journal of Computer-Mediated Communication
, vol.2
-
-
Lee, G.1
-
19
-
-
85039568774
-
Employee privacy in the electronic workplace, Part 1: Surveillance, records and emails
-
December
-
Nolan, J. (2000), "Employee privacy in the electronic workplace, part 1: surveillance, records and emails", Privacy Law and Policy Reporter, December, available at: www.austlii.edu.au/au/journals/PLPR/2000/51.html
-
(2000)
Privacy Law and Policy Reporter
-
-
Nolan, J.1
-
21
-
-
0008144259
-
Anonymity, unobservability and pseudonymity: A proposal for terminology
-
Pfitzmann, A. and Köhntopp, M. (2001), "Anonymity, unobservability and pseudonymity: a proposal for terminology", Proceedings of the 4th International Information Hiding Workshop, USA, available at: www.cert.org/IHW2001/terminology_proposal.pdf
-
(2001)
Proceedings of the 4th International Information Hiding Workshop, USA
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
23
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
November
-
Reiter, M. and Rubin, A. (1998), "Crowds: anonymity for Web transactions", ACM Transactions on Information and System Security, Vol. 1, November, available at: www.research.att.com/projects/crowds
-
(1998)
ACM Transactions on Information and System Security
, vol.1
-
-
Reiter, M.1
Rubin, A.2
-
24
-
-
1642387200
-
An architecture for an anonymity network
-
November
-
Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B. and Hutchinson, D. (1997), "An architecture for an anonymity network", The Mc Kinsey Quaterly, No. 4, November.
-
(1997)
The Mc Kinsey Quaterly
, Issue.4
-
-
Rennhard, M.1
Rafaeli, S.2
Mathy, L.3
Plattner, B.4
Hutchinson, D.5
-
26
-
-
85039580665
-
Information privacy in Australia
-
July
-
Scollay, M. (1997), "Information privacy in Australia", Privacy Law & Policy Reporter, July, available at: www.austilii.edu.au/au/journals/PLPR/1997/36.html
-
(1997)
Privacy Law & Policy Reporter
-
-
Scollay, M.1
-
27
-
-
0141436246
-
Stated privacy preferences vs actual behaviour in EC environments: A reality check
-
Spiekermann, S., Grossglags, J. and Berendt, B. (2001), "Stated privacy preferences vs actual behaviour in EC environments: a reality check", Proceedings of the 5th International Conference on Applied Informatics, available at www.wiwi.hu-berlin.de/~sspiek/artikel/final_privacy.pdf
-
(2001)
Proceedings of the 5th International Conference on Applied Informatics
-
-
Spiekermann, S.1
Grossglags, J.2
Berendt, B.3
-
28
-
-
85039577349
-
Privacy recommendations for financial services: Contrasting the Australian and Canadian approaches
-
January
-
Tuker, G. (1999), "Privacy recommendations for financial services: contrasting the Australian and Canadian approaches", Privacy Law & Policy Reporter, January, available at: www.austlii.edu.au/au/journals/PLPR/1999/5.html
-
(1999)
Privacy Law & Policy Reporter
-
-
Tuker, G.1
|