-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz, N, ed, Advances in Cryptology, CRYPTO'96, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) Advances in Cryptology - CRYPTO'96. Lecture Notes in Computer Science, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
33745844081
-
Location privacy in ubiquitous computing
-
Technical Report 612. University of Cambridge, Cambridge
-
Beresford, A.R.: Location privacy in ubiquitous computing. In: Technical Report 612. University of Cambridge, Cambridge (2005)
-
(2005)
-
-
Beresford, A.R.1
-
3
-
-
34548396941
-
Preserving user location privacy in mobile data management infrastructures
-
Cambridge, UK
-
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures, in sixth workshop on privacy enhancing technologies (PET'06), Cambridge, UK (2006)
-
(2006)
sixth workshop on privacy enhancing technologies (PET'06)
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Soc. 22(6), 664-654 (1976)
-
(1976)
IEEE Trans. Inf. Soc
, vol.22
, Issue.6
, pp. 664-654
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
0003187764
-
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 23 November
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 23 November 1995. Off. J. Eur. Commun. L 281, p. 31
-
(1995)
Off. J. Eur. Commun. L
, vol.281
, pp. 31
-
-
-
6
-
-
34249851077
-
-
Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), 12 July 2002. Off. J. Eur. Commun. L 201/37
-
Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), 12 July 2002. Off. J. Eur. Commun. L 201/37
-
-
-
-
7
-
-
34249862680
-
-
Network of Excellence in Cryptology IST-2002-507932. Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1. 17 February 2005, http://www.ecrypt.eu.org/ documents/STVL-ERICS-2-HASH_STMT-1.1.pdf (last access: 2007-04-04)
-
Network of Excellence in Cryptology IST-2002-507932. Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1. 17 February 2005, http://www.ecrypt.eu.org/ documents/STVL-ERICS-2-HASH_STMT-1.1.pdf (last access: 2007-04-04)
-
-
-
-
8
-
-
0013176783
-
IT-security and privacy-design and use of privacy-enhancing security mechanisms
-
ISBN 3-540-42142-4. Springer, Heidelberg
-
Fischer-Hübner, S.: IT-security and privacy-design and use of privacy-enhancing security mechanisms. Lecutre Notes of Computer Science, LNCS, 1958. ISBN 3-540-42142-4. Springer, Heidelberg (2001)
-
(2001)
LNCS, 1958. Lecutre Notes of Computer Science
-
-
Fischer-Hübner, S.1
-
9
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
MobySys, San Francisco, USA, pp
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of The First ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobySys), San Francisco, USA, pp. 31-42 (2003)
-
(2003)
Proceedings of The First ACM/USENIX International Conference on Mobile Systems, Applications and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
34548186481
-
A privacy enhancing service architecture for ticket-based mobile applications. International Conference on Availability
-
Vienna, Austria, April 10-13
-
Jorns, O., Quirchmayr, G., Jung, O.: A privacy enhancing service architecture for ticket-based mobile applications. International Conference on Availability, Reliability and Security ARES 2007 - The Dependability Conference, Vienna, Austria, April 10-13, 2007
-
(2007)
Reliability and Security ARES 2007 - The Dependability Conference
-
-
Jorns, O.1
Quirchmayr, G.2
Jung, O.3
-
12
-
-
24644486618
-
Privacy for profitable location based services
-
Proceedings of the Second International Conference on Security in Pervasive Computing, Springer, Heidelberg
-
Kölsch, T., Fritsch, L., Hohlweiss, M., Kesdogan, D.: Privacy for profitable location based services. In: Proceedings of the Second International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science (LNCS 3450). pp. 164-179. Springer, Heidelberg (2005)
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3450
, pp. 164-179
-
-
Kölsch, T.1
Fritsch, L.2
Hohlweiss, M.3
Kesdogan, D.4
-
13
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770-772 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
34249851672
-
-
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)
-
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)
-
-
-
-
16
-
-
70349157402
-
The law is not enough: Legislation and privacy enhancing technology for location-aware computing
-
Glasgow, Scotland
-
Price Blane, A.: The law is not enough: legislation and privacy enhancing technology for location-aware computing, workshop on location systems privacy and control, Mobile-HCI 2004, Glasgow, Scotland (2004)
-
(2004)
workshop on location systems privacy and control, Mobile-HCI
-
-
Price Blane, A.1
-
17
-
-
34249854396
-
-
Rodden, T., Friday. A., Müller, H. Dix, A.: A leightweight approach to managing privacy in location-based services, technical report equator-02-058. University of Nottingham and Lancaster University and University of Bristol (2002)
-
Rodden, T., Friday. A., Müller, H. Dix, A.: A leightweight approach to managing privacy in location-based services, technical report equator-02-058. University of Nottingham and Lancaster University and University of Bristol (2002)
-
-
-
-
18
-
-
51349104092
-
-
Internet-Draft, draft-ietf-geopriv-policy-08
-
Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J.: A document format for expressing privacy preferences for location information, Internet-Draft, draft-ietf-geopriv-policy-08 (2006)
-
(2006)
A document format for expressing privacy preferences for location information
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
-
19
-
-
34249852723
-
-
Fernuniversität Hagen, Stuttgart, Germany
-
Treu, G., Küpper, A.: Datenschutzmechanismen für Ortsinformationen aus der Sicht zukünftiger Anwendungen, Tagungsband des zweiten GI/ITG KuVS Fachgesprächs über Ortsbezogene Anwendungen und Dienste, Informatikbericht 324, pp. 66-71. Fernuniversität Hagen, Stuttgart, Germany (2005)
-
(2005)
Datenschutzmechanismen für Ortsinformationen aus der Sicht zukünftiger Anwendungen, Tagungsband des zweiten GI/ITG KuVS Fachgesprächs über Ortsbezogene Anwendungen und Dienste, Informatikbericht
, vol.324
, pp. 66-71
-
-
Treu, G.1
Küpper, A.2
-
20
-
-
0011369031
-
The Computer for the twenty-first century
-
Scientific American, New York
-
Weiser, M.: The Computer for the twenty-first century, pp. 94-100. Scientific American, New York (1991)
-
(1991)
, pp. 94-100
-
-
Weiser, M.1
|