-
1
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
November 3-5, Denver, Colorado, USA
-
Ackerman, M., Cranor, L., & Reagle, R. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proceedings of the ACM Conference on Electronic Commerce, pp. 1-8, November 3-5, Denver, Colorado, USA.
-
(1999)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.1
Cranor, L.2
Reagle, R.3
-
2
-
-
0038687775
-
Design and implementation of the Idemix anonymous credential system
-
November 17-21, Washington, DC, USA
-
Camenisch, J., & Herreweghen, E. (2002). Design and implementation of the Idemix anonymous credential system. Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21-30, November 17-21, Washington, DC, USA.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Camenisch, J.1
Herreweghen, E.2
-
3
-
-
34748843607
-
Attitudes towards information privacy
-
December 2001, Coffs Harbour, NSW, Australia
-
Cockcroft, S., & Clutterbuck, P. (2001). Attitudes towards information privacy. Proceedings of the 12th Australasian Conference on Information Systems, December 2001, Coffs Harbour, NSW, Australia.
-
(2001)
Proceedings of the 12th Australasian Conference on Information Systems
-
-
Cockcroft, S.1
Clutterbuck, P.2
-
5
-
-
14744268052
-
Privacy engineering for digital rights management systems
-
November 5, Philadelphia, Pennsylvania, USA
-
Feigenbaum, J., Freedman, J., Sander, T., & Shostack, A. (2001). Privacy engineering for digital rights management systems. Proceedings of the ACM Workshop in Security and Privacy in Digital Rights Management, pp. 76-105, November 5, Philadelphia, Pennsylvania, USA.
-
(2001)
Proceedings of the ACM Workshop in Security and Privacy in Digital Rights Management
, pp. 76-105
-
-
Feigenbaum, J.1
Freedman, J.2
Sander, T.3
Shostack, A.4
-
6
-
-
70450277696
-
Protecting personal information: Obstacles and directions
-
June 2-3, Harvard Square, MA, USA
-
Greenstadt, R., & Smith, M. (2005). Protecting personal information: Obstacles and directions. Proceedings of the 5th Workshop on Economics Information Security, pp. 22, June 2-3, Harvard Square, MA, USA.
-
(2005)
Proceedings of the 5th Workshop on Economics Information Security
, pp. 22
-
-
Greenstadt, R.1
Smith, M.2
-
7
-
-
35548970553
-
Multimedia, cyberspace & ethics
-
July 19-21, London, England
-
Jefferies, P. (2000). Multimedia, cyberspace & ethics. Proceedings of the International Conference on Information Visualization, pp. 99-104, July 19-21, London, England.
-
(2000)
Proceedings of the International Conference on Information Visualization
, pp. 99-104
-
-
Jefferies, P.1
-
8
-
-
2442557513
-
Modeling control in context-aware systems
-
3
-
Jiang, X., & Landay, J. (2002). Modeling control in context-aware systems. IEEE Pervasive Computing, 1(3), 59-63.
-
(2002)
IEEE Pervasive Computing
, vol.1
, pp. 59-63
-
-
Jiang, X.1
Landay, J.2
-
9
-
-
84937391117
-
Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
-
September 29-October 1, Göteborg, Sweden
-
Jiang, X., Hong, J., & Landay, J. (2002). Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. Proceedings of the Fourth International Conference of Ubiquitous Computing, September 29-October 1, Göteborg, Sweden.
-
(2002)
Proceedings of the Fourth International Conference of Ubiquitous Computing
-
-
Jiang, X.1
Hong, J.2
Landay, J.3
-
10
-
-
35548957151
-
Stealth, polymorphism and other stranger words
-
Miller, L. (1994). Stealth, polymorphism and other stranger words. CHIPS Magazine, pp. 48.
-
(1994)
CHIPS Magazine
, pp. 48
-
-
Miller, L.1
-
12
-
-
35048864339
-
Trading privacy for trust
-
March 29-April 1, Oxford, UK
-
Signeur, J., & Jensen, C (2004). Trading privacy for trust. Proceedings of the 2nd International conference on Trust Management, Vol. 2995, pp. 93-107, March 29-April 1, Oxford, UK.
-
(2004)
Proceedings of the 2nd International Conference on Trust Management
, vol.2995
, pp. 93-107
-
-
Signeur, J.1
Jensen, C.2
-
16
-
-
1642275617
-
Policy migration for sensitive credentials in trust negotiation
-
October 30, Washington DC, USA
-
Yu, T., & Winslett, M. (2003). Policy migration for sensitive credentials in trust negotiation. Proceedings of the 2nd Workshop on Privacy in the Electronic Society, October 30, Washington DC, USA.
-
(2003)
Proceedings of the 2nd Workshop on Privacy in the Electronic Society
-
-
Yu, T.1
Winslett, M.2
-
17
-
-
35548993061
-
-
Technical Report, CSCE Department of University of Arkansas
-
Zuo, Y., Maxwell, B., Nguyen, H., & Loh, Y. (2004). Implementing Certified Digital Mail. Technical Report, CSCE Department of University of Arkansas.
-
(2004)
Implementing Certified Digital Mail
-
-
Zuo, Y.1
Maxwell, B.2
Nguyen, H.3
Loh, Y.4
|