-
1
-
-
33747202578
-
-
Bauer M., Meints M., and Hansen M. (Eds) [current May 2006]
-
In: Bauer M., Meints M., and Hansen M. (Eds). D3.1: structured overview on prototypes and concepts of identity management systems. Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society, V1.1 (September 2005). http://fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf [current May 2006]
-
(2005)
Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society, V1.1
-
-
-
2
-
-
33747184932
-
-
Borcea K, Donker H, Franz E, Liesebach K, Pfitzmann A, Wahrig H. Intra-application partitioning of personal data. In: Proceedings of workshop on privacy-enhanced personalization (PEP 2005), Edinburgh, UK; 2005, http://www.isr.uci.edu/pep05/papers/borcea-pep.pdf [current May 2006].
-
-
-
-
3
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
[current May 2006]
-
Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28 10 (October 1985) 1030-1044. http://chaum.com/articles/Security_Wthout_Identification.htm [current May 2006]
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
57249106771
-
-
Dourish P, Bly S. Portholes: supporting awareness in a distributed work group. In: Proceedings of ACM CHI'92 conference on human factors in computing system, http://www.ics.uci.edu/∼jpd/publications/1992/chi92-portholes.pdf; 1992. p. 541-7 [current May 2006].
-
-
-
-
5
-
-
0039246956
-
The social cost of cheap pseudonyms
-
[Version of 1998: Mimeo, Version of 2001] [Version of Aug 1999, current May 2006]
-
Friedman E.J., and Resnick P. The social cost of cheap pseudonyms. [Version of 1998: Mimeo, Version of 2001]. Journal of Economics and Management Strategy 10 2 (1998) 173-199. http://www.si.umich.edu/∼presnick/papers/identifiers/081199.pdf [Version of Aug 1999, current May 2006]
-
(1998)
Journal of Economics and Management Strategy
, vol.10
, Issue.2
, pp. 173-199
-
-
Friedman, E.J.1
Resnick, P.2
-
6
-
-
33750937109
-
-
Franz E, Böttcher A, Wahrig H, Borcea-Pfitzmann K. Access control in a privacy-aware eLearning environment. In: Proceedings of AReS 2006, workshop on security in eLearning (SEL), Vienna; April 2006.
-
-
-
-
7
-
-
1642281602
-
Privacy enhancing identity management
-
[Elsevier]
-
Hansen M., Berlich P., Camenisch J., Clauß S., Pfitzmann A., and Waidner M. Privacy enhancing identity management. Information Security Technical Report 9 1 (2004) 35-44 [Elsevier]
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clauß, S.4
Pfitzmann, A.5
Waidner, M.6
-
8
-
-
33747196800
-
-
Pfitzmann A, Hansen M. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Working paper v0.28, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml; May 2006 [current May 2006].
-
-
-
-
9
-
-
1642344244
-
IT security and multilateral security
-
Multilateral security in communications. Müller G., and Rannenberg K. (Eds), Addison-Wesley, München
-
Rannenberg K., Pfitzmann A., and Müller G. IT security and multilateral security. In: Müller G., and Rannenberg K. (Eds). Multilateral security in communications. Technology, infrastructure, economy vol. 3 (1999), Addison-Wesley, München 21-29
-
(1999)
Technology, infrastructure, economy
, vol.3
, pp. 21-29
-
-
Rannenberg, K.1
Pfitzmann, A.2
Müller, G.3
-
10
-
-
33845539701
-
-
Steinbrecher S. Design options for privacy-respecting reputation systems within centralized Internet communities. In: Fischer-Hübner S, Rannenberg K, Yngström L, Lindskog S, editors. Proceedings of the IFIP TC-11 21st international information security conference (SEC 2006), 22-24 May, 2006, Karlstad, Sweden. International Federation for Information Processing (IFIP), vol. 201. Springer; 2006.
-
-
-
-
11
-
-
0033717446
-
Properties of protection goals and their integration into a user interface
-
Wolf G., and Pfitzmann A. Properties of protection goals and their integration into a user interface. Computer Networks 32 6 (2000) 685-700
-
(2000)
Computer Networks
, vol.32
, Issue.6
, pp. 685-700
-
-
Wolf, G.1
Pfitzmann, A.2
|