-
2
-
-
36649029302
-
A Framework for Privacy-Preserving E-learning
-
Monoton
-
E. Aïmeur, H. Hage, and F. S. ManiOnana, "A Framework for Privacy-Preserving E-learning," in Joint Itrust and PST conferences on Privacy, Trust Management and Security (IFIPTM 2007), Monoton, 2007, pp. 223-238.
-
(2007)
Joint Itrust and PST conferences on Privacy, Trust Management and Security (IFIPTM 2007)
, pp. 223-238
-
-
Aïmeur, E.1
Hage, H.2
ManiOnana, F.S.3
-
3
-
-
84870965272
-
-
Learning Technologies Standardization Committee LTSC, at, Retrieved September 2007
-
Learning Technologies Standardization Committee (LTSC). Web site at http://www.ieeeltsc.org/. Retrieved September 2007.
-
Web site
-
-
-
4
-
-
84870965272
-
-
IMS Global Learning Consortium, at, Retrieved September 2007
-
IMS Global Learning Consortium. Web site at http://www.imsproiect.org/. Retrieved September 2007.
-
Web site
-
-
-
5
-
-
18844457077
-
Privacy provision in e-learning standardized systems: Status and improvements
-
June
-
B. Jerman-Blazic and T. Klobucar, "Privacy provision in e-learning standardized systems: status and improvements," Computer Standards & Interfaces, vol. 27, pp. 561-578, June 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, pp. 561-578
-
-
Jerman-Blazic, B.1
Klobucar, T.2
-
6
-
-
33750937109
-
Access Control in a Privacy-Aware eLearning Environment
-
Vienna
-
E. Franz, H. Wahrig, A. Boettcher, and K. Borcea-Pfitzmann, "Access Control in a Privacy-Aware eLearning Environment," in International Conference on Availability, Reliability and Security (ARES 2006), Vienna, 2006, pp. 879-886.
-
(2006)
International Conference on Availability, Reliability and Security (ARES 2006)
, pp. 879-886
-
-
Franz, E.1
Wahrig, H.2
Boettcher, A.3
Borcea-Pfitzmann, K.4
-
7
-
-
33749077191
-
Security in the online e-learning environment
-
R. Raitman, L. Ngo, N. Augar, and W.Zhou, "Security in the online e-learning environment," IEEE International Conference on Advanced Learning Technologies (ICALT 2005), vol. 5, pp. 702-706, 2005.
-
(2005)
IEEE International Conference on Advanced Learning Technologies (ICALT 2005)
, vol.5
, pp. 702-706
-
-
Raitman, R.1
Ngo, L.2
Augar, N.3
Zhou, W.4
-
8
-
-
3042575530
-
The Negotiation of Privacy Policies in Distance Education
-
Philadelphia
-
G. Yee and L. Korba, "The Negotiation of Privacy Policies in Distance Education," in IRMA International Conference, Philadelphia, 2003.
-
(2003)
IRMA International Conference
-
-
Yee, G.1
Korba, L.2
-
9
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make Big Brother obsolete," Communications of the ACM, vol. 28, pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
10
-
-
79251590715
-
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
-
Santa Barbara
-
D. Chaum and J. Evertse, "A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations," in Advances in Cryptology -CRYPTO '86, Santa Barbara, 1987, pp. 118-167.
-
(1987)
Advances in Cryptology -CRYPTO '86
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.2
-
13
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Innsbruck
-
J. Camenisch and A. Lysyanskaya, "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation," in Advances in Cryptology - EUROCRYPT 2001, Innsbruck, 2001, pp. 93-118.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
67651053584
-
Pseudonym Systems
-
Kingston
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf, "Pseudonym Systems," in Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Kingston, 1999, pp. 184-199.
-
(1999)
Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
15
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle, "Secure communications over insecure channels," Communications of the ACM, vol. 21, pp. 294-299, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
17
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|