메뉴 건너뛰기




Volumn 3, Issue 2, 2007, Pages 185-194

Transaction pseudonyms in mobile environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA ACQUISITION; MESSAGE PASSING; MOBILE PHONES; USER INTERFACES;

EID: 34249846592     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-007-0049-x     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Koblitz, N, ed, Advances in Cryptology, CRYPTO'96, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) Advances in Cryptology - CRYPTO'96. Lecture Notes in Computer Science, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 33745844081 scopus 로고    scopus 로고
    • Location privacy in ubiquitous computing
    • Technical Report 612. University of Cambridge, Cambridge
    • Beresford, A.R.: Location privacy in ubiquitous computing. In: Technical Report 612. University of Cambridge, Cambridge (2005)
    • (2005)
    • Beresford, A.R.1
  • 4
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Soc. 22(6), 664-654 (1976)
    • (1976) IEEE Trans. Inf. Soc , vol.22 , Issue.6 , pp. 664-654
    • Diffie, W.1    Hellman, M.2
  • 5
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 23 November
    • Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 23 November 1995. Off. J. Eur. Commun. L 281, p. 31
    • (1995) Off. J. Eur. Commun. L , vol.281 , pp. 31
  • 6
    • 34249851077 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), 12 July 2002. Off. J. Eur. Commun. L 201/37
    • Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), 12 July 2002. Off. J. Eur. Commun. L 201/37
  • 7
    • 34249862680 scopus 로고    scopus 로고
    • Network of Excellence in Cryptology IST-2002-507932. Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1. 17 February 2005, http://www.ecrypt.eu.org/ documents/STVL-ERICS-2-HASH_STMT-1.1.pdf (last access: 2007-04-04)
    • Network of Excellence in Cryptology IST-2002-507932. Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1. 17 February 2005, http://www.ecrypt.eu.org/ documents/STVL-ERICS-2-HASH_STMT-1.1.pdf (last access: 2007-04-04)
  • 8
    • 0013176783 scopus 로고    scopus 로고
    • IT-security and privacy-design and use of privacy-enhancing security mechanisms
    • ISBN 3-540-42142-4. Springer, Heidelberg
    • Fischer-Hübner, S.: IT-security and privacy-design and use of privacy-enhancing security mechanisms. Lecutre Notes of Computer Science, LNCS, 1958. ISBN 3-540-42142-4. Springer, Heidelberg (2001)
    • (2001) LNCS, 1958. Lecutre Notes of Computer Science
    • Fischer-Hübner, S.1
  • 10
    • 34548186481 scopus 로고    scopus 로고
    • A privacy enhancing service architecture for ticket-based mobile applications. International Conference on Availability
    • Vienna, Austria, April 10-13
    • Jorns, O., Quirchmayr, G., Jung, O.: A privacy enhancing service architecture for ticket-based mobile applications. International Conference on Availability, Reliability and Security ARES 2007 - The Dependability Conference, Vienna, Austria, April 10-13, 2007
    • (2007) Reliability and Security ARES 2007 - The Dependability Conference
    • Jorns, O.1    Quirchmayr, G.2    Jung, O.3
  • 12
    • 24644486618 scopus 로고    scopus 로고
    • Privacy for profitable location based services
    • Proceedings of the Second International Conference on Security in Pervasive Computing, Springer, Heidelberg
    • Kölsch, T., Fritsch, L., Hohlweiss, M., Kesdogan, D.: Privacy for profitable location based services. In: Proceedings of the Second International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science (LNCS 3450). pp. 164-179. Springer, Heidelberg (2005)
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3450 , pp. 164-179
    • Kölsch, T.1    Fritsch, L.2    Hohlweiss, M.3    Kesdogan, D.4
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770-772 (1981)
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 14
    • 34249851672 scopus 로고    scopus 로고
    • Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)
    • Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)
  • 16
    • 70349157402 scopus 로고    scopus 로고
    • The law is not enough: Legislation and privacy enhancing technology for location-aware computing
    • Glasgow, Scotland
    • Price Blane, A.: The law is not enough: legislation and privacy enhancing technology for location-aware computing, workshop on location systems privacy and control, Mobile-HCI 2004, Glasgow, Scotland (2004)
    • (2004) workshop on location systems privacy and control, Mobile-HCI
    • Price Blane, A.1
  • 17
    • 34249854396 scopus 로고    scopus 로고
    • Rodden, T., Friday. A., Müller, H. Dix, A.: A leightweight approach to managing privacy in location-based services, technical report equator-02-058. University of Nottingham and Lancaster University and University of Bristol (2002)
    • Rodden, T., Friday. A., Müller, H. Dix, A.: A leightweight approach to managing privacy in location-based services, technical report equator-02-058. University of Nottingham and Lancaster University and University of Bristol (2002)
  • 20
    • 0011369031 scopus 로고
    • The Computer for the twenty-first century
    • Scientific American, New York
    • Weiser, M.: The Computer for the twenty-first century, pp. 94-100. Scientific American, New York (1991)
    • (1991) , pp. 94-100
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.