-
2
-
-
84908893566
-
Business model analysis applied to mobile business
-
Camponovo, G., Pigneur, Y.: Business model analysis applied to mobile business. In: ICEIS 2003. (2003)
-
(2003)
ICEIS 2003
-
-
Camponovo, G.1
Pigneur, Y.2
-
3
-
-
24644500710
-
PRIME public deliverable D14.0a framework VO
-
PRIME WP 14.0
-
PRIME WP 14.0: PRIME Public Deliverable D14.0a Framework VO. Technical report (2004) http://www.prime-project.eu.int.
-
(2004)
Technical Report
-
-
-
4
-
-
84948461035
-
Location aggregation from multiple sources
-
Society, I.C., ed.: Singapore
-
Myllymaki, J., Edlund, S.: Location Aggregation from Multiple Sources. In Society, I.C., ed.: Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), Singapore (2002)
-
(2002)
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002)
-
-
Myllymaki, J.1
Edlund, S.2
-
5
-
-
0003857660
-
The economics, concept and design of information intermediaries - A theoretic approach
-
Physica-Verlag, Heidelberg
-
Rose, F.: The economics, concept and design of information intermediaries - A theoretic approach. Information Age Economy. Physica-Verlag, Heidelberg (1999)
-
(1999)
Information Age Economy
-
-
Rose, F.1
-
7
-
-
0036005221
-
Toward a typology of internet users and online privacy concerns
-
Sheehan, K.: Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society 18 (2002) 21-32
-
(2002)
The Information Society
, vol.18
, pp. 21-32
-
-
Sheehan, K.1
-
9
-
-
0008213317
-
Privacy online: Fair information practices in the electronic marketplace
-
Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace. Technical report (2000)
-
(2000)
Technical Report
-
-
-
10
-
-
0033244306
-
What's in a name? - Some reflections on the Sociology of Anonymity
-
Marx, G.: What's in a name? - Some reflections on the Sociology of Anonymity. The Information Society 15 (1999)
-
(1999)
The Information Society
, vol.15
-
-
Marx, G.1
-
11
-
-
0343823867
-
Security in public mobile communication networks
-
Aachen, Verlag der Augustinus Buchhandlung
-
Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: IFIP TC 6 International Workshop on Personal Wireless Communications, Aachen, Verlag der Augustinus Buchhandlung (1995) 105-116
-
(1995)
IFIP TC 6 International Workshop on Personal Wireless Communications
, pp. 105-116
-
-
Federrath, H.1
Jerichow, A.2
Kesdogan, D.3
Pfitzmann, A.4
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
13
-
-
15744367730
-
Design and implementation of the idemix anonymous credential system - Research report RZ 3419
-
Zürich
-
Camenish, J., van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System - Research Report RZ 3419. Technical report, Zürich (2002)
-
(2002)
Technical Report
-
-
Camenish, J.1
Van Herreweghen, E.2
-
15
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys'03). (2003) 31-42
-
(2003)
Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys'03)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
16
-
-
24944578141
-
Enterprise privacy authorization language (EPAL 1.1) - IBM research report
-
Ashley, P., Hada, S., Günter, K., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) - IBM Research Report. Technical report (2003) http://www.zurich.ibm.com/ security/enterprise-privacy/ epal/Specificatio\%n/index.html.
-
(2003)
Technical Report
-
-
Ashley, P.1
Hada, S.2
Günter, K.3
Powers, C.4
Schunter, M.5
-
17
-
-
0013243382
-
The platform for privacy preferences 1.0 (P3P1.0) specification - W3C recommendation
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification - W3C Recommendation. Technical report (2002)
-
(2002)
Technical Report
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
20
-
-
44249114234
-
Privacy and security of personal information - Economic incentives and technological solutions
-
Camp, J.L., Lewis, S., eds.: Kleuwer
-
Acquisti, A.: Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. In Camp, J.L., Lewis, S., eds.: Economics of Information Security. Kleuwer (2004)
-
(2004)
Economics of Information Security
-
-
Acquisti, A.1
-
22
-
-
24644441695
-
Standards for geographic location and privacy: IETF's geopriv
-
Müller, M.: Standards for Geographic Location and Privacy: IETF's Geopriv. Datenschutz und Datensicherheit (DuD) 28 (2004) 297-303
-
(2004)
Datenschutz und Datensicherheit (DuD)
, vol.28
, pp. 297-303
-
-
Müller, M.1
-
23
-
-
24644504765
-
Location based services - Permanent reference document SE.23
-
GSM Association: Location Based Services - Permanent Reference Document SE.23. Technical report (2003)
-
(2003)
Technical Report
-
-
-
25
-
-
24644436353
-
Location privacy in the alipes platform
-
Lulea, Sweden
-
Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes Platform. Technical report, Lulea, Sweden (2002)
-
(2002)
Technical Report
-
-
Synnes, K.1
Nord, J.2
Parnes, P.3
-
26
-
-
84981523619
-
Collecting and providing location information: The location trader
-
München, TU München
-
Huber, M., Dietl, T., Kammerl, J., Dornbusch, P.: Collecting and providing location information: The location trader. In: MoMuc, München, TU München (2003)
-
(2003)
MoMuc
-
-
Huber, M.1
Dietl, T.2
Kammerl, J.3
Dornbusch, P.4
-
27
-
-
0035480037
-
Identity management and its support of multilateral security
-
Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks (2001) 205-219 http://drim.inf.tu- dresden.de/.
-
(2001)
Computer Networks
, pp. 205-219
-
-
Clauß, S.1
Köhntopp, M.2
-
29
-
-
84958756084
-
Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks
-
Springer-Verlag
-
Kesdogan, D., Reichl, P., Junghärtchen, K.: Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. Volume 1485 of LNCS., Springer-Verlag (1998)
-
(1998)
LNCS
, vol.1485
-
-
Kesdogan, D.1
Reichl, P.2
Junghärtchen, K.3
-
30
-
-
24644489130
-
Re-identification methods for masked microdata
-
Berlin Heidelberg, Springer-Verlag
-
Winkler, W.E.: Re-identification methods for masked microdata. Volume 3050 of LNCS., Berlin Heidelberg, Springer-Verlag (2004) 216-230
-
(2004)
LNCS
, vol.3050
, pp. 216-230
-
-
Winkler, W.E.1
|