-
1
-
-
84955599449
-
How to date blind signatures
-
Abe, M., & Fujisaki, E. (1996). How to date blind signatures. In AsiaCrypto'96, LNCS, 1163 (pp. 244-251).
-
(1996)
AsiaCrypto'96, LNCS
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
2
-
-
84900181060
-
-
Retrieved April, 2005, from
-
AT&T e-Wallet Supplemental Privacy Notice. (2005). Retrieved April, 2005, from http://www.mymmode.com/e-wallet/privacy.html.
-
(2005)
AT&T e-Wallet Supplemental Privacy Notice
-
-
-
3
-
-
84900107562
-
-
Retrieved April, 2005, from
-
AT&T Wireless e-Wallet User Agreement. (2005). Retrieved April, 2005, from http://www.mobile.att.net/e-wallet/agreement.html.
-
(2005)
AT&T Wireless e-Wallet User Agreement
-
-
-
4
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
In H. Federrath (Ed.)
-
Berthold, O., Federrath, H., & Kopsell, S. (2000). Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath (Ed.), Anonymity 2000, LNCS, 2009 (pp. 115-129).
-
(2000)
Anonymity 2000, LNCS, 2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Kopsell, S.3
-
5
-
-
0002751414
-
The ESPRIT Project CAFE - High security digital payment systems
-
Boly, J. P., Bosselaers, A., Cramer, R., Michelsen, R., Mjølsnes, S.,Muller, F., et al. (1994). The ESPRIT Project CAFE - High security digital payment systems. In Proceedings of Third European Symposium on Research in Computer Security (ESORICS 94), LNCS 875 (pp. 217-230).
-
(1994)
Proceedings of Third European Symposium On Research In Computer Security (ESORICS 94), LNCS 875
, pp. 217-230
-
-
Boly, J.P.1
Bosselaers, A.2
Cramer, R.3
Michelsen, R.4
Mjølsnes, S.5
Muller, F.6
-
7
-
-
70350538015
-
-
(White Paper by Zero-Knowledge Systems, Inc.). Retrieved from
-
Brands, S. (2000). Private credentials (White Paper by Zero-Knowledge Systems, Inc.). Retrieved from http://www.zks.net/media/credsnew.pdf.
-
(2000)
Private Credentials
-
-
Brands, S.1
-
8
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
Chaum, D. (1981). Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM, 24(2), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0001604533
-
Blind signatures for untraceable payments
-
In D. Chaum, R. L. Rivest, & A. T. Sherman (Eds.)
-
Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman (Eds.), Advances in Cryptology - CRYPTO'82 (pp. 199-203).
-
(1982)
Advances In Cryptology - CRYPTO'82
, pp. 199-203
-
-
Chaum, D.1
-
10
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
11
-
-
85034632918
-
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
-
Chaum, D. (1988). Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In Advances in Cryptology - Eurocrypt'88 (pp.177-182).
-
(1988)
Advances In Cryptology - Eurocrypt'88
, pp. 177-182
-
-
Chaum, D.1
-
12
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
Chaum, D., & Evertse, J. (1986). A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology - CRYPTO'86, LNCS 0263 (pp. 118-167).
-
(1986)
Advances In Cryptology - CRYPTO'86, LNCS 0263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.2
-
16
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Cramer, R., Gennaro, R., & Schoenmakers, B. (1997). A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology - Eurocrypt'97, LNCS 1233 (pp.103-118).
-
(1997)
Advances In Cryptology - Eurocrypt'97, LNCS 1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
17
-
-
85031802442
-
Payment systems and credential mechanisms with provably secure against adaptive abuse by individuals
-
Damgard, I. B. (1988). Payment systems and credential mechanisms with provably secure against adaptive abuse by individuals. In Advances in Cryptology - CRYPTO'88, LNCS 0403 (pp. 328-335).
-
(1988)
Advances In Cryptology - CRYPTO'88, LNCS 0403
, pp. 328-335
-
-
Damgard, I.B.1
-
18
-
-
84900212946
-
-
Department of Justice. (n.d.), Retrieved February 28, 2005, from
-
Department of Justice. (n.d.). Privacy provisions highlights. Retrieved February 28, 2005, from http://canada.justice.gc.ca/en/news/nr/1998/attback2.html.
-
Privacy Provisions Highlights
-
-
-
19
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
-
(1976)
IEEE Transactions On Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
20
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 22(6), 469-472.
-
(1985)
IEEE Transactions On Information Theory
, vol.22
, Issue.6
, pp. 469-472
-
-
Elgamal, T.1
-
22
-
-
84944906479
-
Secure and efficient off-line digital money
-
Franklin, M., & Yung, M. (1993). Secure and efficient off-line digital money. In Proceedings of 20th International Colloquium on Automata, Languages and Programming (ICALP), LNCS 700 (pp. 265-276).
-
(1993)
Proceedings of 20th International Colloquium On Automata, Languages and Programming (ICALP), LNCS 700
, pp. 265-276
-
-
Franklin, M.1
Yung, M.2
-
23
-
-
37849049105
-
-
Retrieved from
-
Glenn, A., Goldberg, I., Legare, F., & Stiglic, A. (2001). A description of protocols for private credentials(White Paper patented by Zero-Knowledge Systems, Inc.). Retrieved from http://crypto.cs.mcgill.ca/~stiglic/Papers/brands.pdf#search='privatecredential'.
-
(2001)
A Description of Protocols For Private Credentials(White Paper Patented By Zero-Knowledge Systems, Inc.)
-
-
Glenn, A.1
Goldberg, I.2
Legare, F.3
Stiglic, A.4
-
24
-
-
0030644696
-
Privacy-enhancing technologies for the Internet
-
Goldberg, I., Wagner, D., & Brewer, E. (1997). Privacy-enhancing technologies for the Internet. In IEEE COMPCON'97 (pp. 103-109).
-
(1997)
IEEE COMPCON'97
, pp. 103-109
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
25
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
Goldschlag, D., Reed, M., & Syverson, P. (1999). Onion routing for anonymous and private Internet connections. Communication of the ACM, 42(2), 39-41.
-
(1999)
Communication of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
26
-
-
9744267657
-
-
Government of Canada. (n.d.), Retrieved February 28, 2005, from
-
Government of Canada. (n.d.). Personal Information Protection and Electronic Documents Act. Retrieved February 28, 2005, from http://www.privcom.gc.ca/legislation/02_06_01_01_e.asp.
-
Personal Information Protection and Electronic Documents Act
-
-
-
28
-
-
0010834145
-
-
IBM, Retrieved from
-
IBM. (1999). Multi-national consumer privacy survey. Retrieved from http://www.mischiefmarketing.com/privacy_survey_oct991.pdf.
-
(1999)
Multi-national Consumer Privacy Survey
-
-
-
30
-
-
0036453755
-
A verifiable multi-authority secret election allowing abstention from voting
-
Juang, W. S., Lei, C. L., & Liaw, H. T. (2002). A verifiable multi-authority secret election allowing abstention from voting. Journal of Computer, 45(6), 672-682.
-
(2002)
Journal of Computer
, vol.45
, Issue.6
, pp. 672-682
-
-
Juang, W.S.1
Lei, C.L.2
Liaw, H.T.3
-
31
-
-
0041850938
-
A new electronic check system with reusable refunds
-
Kim, S., & Oh, H. (2002). A new electronic check system with reusable refunds. International Journal of Information Security, 1(3), 175-188.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.3
, pp. 175-188
-
-
Kim, S.1
Oh, H.2
-
32
-
-
0034317566
-
Fairness and privacy on pay-per view system for Web-based video service
-
Lee, N. Y. (2000). Fairness and privacy on pay-per view system for Web-based video service. IEEE Transactions on Consumer Electronics, 46(4), 980-984.
-
(2000)
IEEE Transactions On Consumer Electronics
, vol.46
, Issue.4
, pp. 980-984
-
-
Lee, N.Y.1
-
33
-
-
0034140141
-
Privacy and non-repudiation on pay-TV systems
-
Lee, N. Y., Change, C. C., Lin, C. L., & Hwang, T. (2000). Privacy and non-repudiation on pay-TV systems. IEEE Transactions on Consumer Electronics, 46(1), 20-26.
-
(2000)
IEEE Transactions On Consumer Electronics
, vol.46
, Issue.1
, pp. 20-26
-
-
Lee, N.Y.1
Change, C.C.2
Lin, C.L.3
Hwang, T.4
-
34
-
-
1542275320
-
A secure electronic voting protocol for general elections
-
Liaw, H. T. (2003). A secure electronic voting protocol for general elections. Journal of Computers & Security, 23, 107-119.
-
(2003)
Journal of Computers & Security
, vol.23
, pp. 107-119
-
-
Liaw, H.T.1
-
35
-
-
67651053584
-
Pseudonym systems
-
In H. Heys, & C. Adams (Eds.)
-
Lysyanskaya, A., Rivest, R. L., Sahai, A., & Wolf, S. (2000). Pseudonym systems. In H. Heys, & C. Adams (Eds.), SAC'99, LNCS 1758 (pp. 184-199).
-
(2000)
SAC'99, LNCS 1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
37
-
-
84958045705
-
A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem
-
Miyazaki, S., & Sakurai, K. (1998). A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem. In Financial Cryptography (FC'98), LNCS 1465 (pp. 296-308).
-
(1998)
Financial Cryptography (FC'98), LNCS 1465
, pp. 296-308
-
-
Miyazaki, S.1
Sakurai, K.2
-
38
-
-
17344392491
-
Online e-Wallet system with decentralized credential keepers
-
Mjolsnes, S. F., & Rong, C. (2003). Online e-Wallet system with decentralized credential keepers. Mobile Networks and Applications, 8(1), 87-99.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.1
, pp. 87-99
-
-
Mjolsnes, S.F.1
Rong, C.2
-
39
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
In H. Federrath (Ed.)
-
Raymond, J. (2000). Traffic analysis: Protocols, attacks, design issues, and open problems. In H. Federrath (Ed.), Anonymity 2000, LNCS 2009 (pp.10-29).
-
(2000)
Anonymity 2000, LNCS 2009
, pp. 10-29
-
-
Raymond, J.1
-
40
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM, 21(2), 120-126.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
41
-
-
0042196056
-
Pay-TV system with strong privacy and non-repudiation protection
-
Song, R., & Korba, L. (2003). Pay-TV system with strong privacy and non-repudiation protection. IEEE Transactions on Consumer Electronics, 49(2), 408-413.
-
(2003)
IEEE Transactions On Consumer Electronics
, vol.49
, Issue.2
, pp. 408-413
-
-
Song, R.1
Korba, L.2
-
42
-
-
3042553377
-
How to make e-cash with non-repudiation and anonymity (NRC 46549)
-
April 5-7, Las Vegas, Nevada, USA
-
Song, R., & Korba, L. (2004, April 5-7). How to make e-cash with non-repudiation and anonymity (NRC 46549). In Proceedings of International Conference on Information Technology (ITCC 2004), Las Vegas, Nevada, USA.
-
(2004)
Proceedings of International Conference On Information Technology (ITCC 2004)
-
-
Song, R.1
Korba, L.2
-
43
-
-
0035520315
-
Analysis of privacy and non-repudiation on pay-TV systems
-
Song, R., & Lyu, M. R. (2001). Analysis of privacy and non-repudiation on pay-TV systems. IEEE Transactions on Consumer Electronics, 47(4), 729-733.
-
(2001)
IEEE Transactions On Consumer Electronics
, vol.47
, Issue.4
, pp. 729-733
-
-
Song, R.1
Lyu, M.R.2
-
48
-
-
85001837279
-
Semiautomatic derivation and use of personal privacy policies in e-business
-
January
-
Yee, G., & Korba, L. (2005, January). Semiautomatic derivation and use of personal privacy policies in e-business. International Journal of E-Business Research, 1(1), 54-69.
-
(2005)
International Journal of E-Business Research
, vol.1
, Issue.1
, pp. 54-69
-
-
Yee, G.1
Korba, L.2
|