-
2
-
-
45949103706
-
D3.1: structured overview on prototypes and concepts of identity management systems
-
Bauer M., Meints M., and Hansen M. (Eds) [current June 2008]
-
D3.1: structured overview on prototypes and concepts of identity management systems. In: Bauer M., Meints M., and Hansen M. (Eds). Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society (2005). http://fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf [current June 2008]
-
(2005)
Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society
-
-
-
3
-
-
33747186401
-
What user-controlled identity management should learn from communities
-
Elsevier no. 3, p. 119-28
-
Borcea-Pfitzmann K., Hansen M., Liesebach K., Pfitzmann A., and Steinbrecher S. What user-controlled identity management should learn from communities. Information security technical report vol. 11 (2006), Elsevier no. 3, p. 119-28
-
(2006)
Information security technical report
, vol.11
-
-
Borcea-Pfitzmann, K.1
Hansen, M.2
Liesebach, K.3
Pfitzmann, A.4
Steinbrecher, S.5
-
4
-
-
33748538996
-
Perspectives for cryptographic long-term security
-
no. 9, p. 50-55
-
Buchmann J., May A., and Vollmer U. Perspectives for cryptographic long-term security. Communications of the ACM vol. 49 (Sep. 2006) no. 9, p. 50-55
-
(2006)
Communications of the ACM
, vol.49
-
-
Buchmann, J.1
May, A.2
Vollmer, U.3
-
5
-
-
33749684958
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
IBM Research
-
Camenisch J., and Lysyanskaya A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research report RZ 3295 (# 93341) (Nov. 2000), IBM Research
-
(2000)
Research report RZ 3295 (# 93341)
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
33645678639
-
-
Trusted Systems Laboratory, HP Laboratories Bristol [current June 2008]
-
Casassa Mont M., Pearson S., and Bramhall P. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, HPL-2003-49 (2003), Trusted Systems Laboratory, HP Laboratories Bristol. http://www.hpl.hp.com/techreports/2003/HPL-2003-49.pdf [current June 2008]
-
(2003)
Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, HPL-2003-49
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
no. 2, p. 84-8
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM vol. 24 (Feb. 1981) no. 2, p. 84-8
-
(1981)
Communications of the ACM
, vol.24
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
[current June 2008]
-
Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM vol. 28 (Oct. 1985). http://chaum.com/articles/Security_Wthout_Identification.htm [current June 2008]
-
(1985)
Communications of the ACM
, vol.28
-
-
Chaum, D.1
-
10
-
-
0032201622
-
Private information retrieval
-
Chor B., Kushilevitz E., Goldreich O., and Sudan M. Private information retrieval. Journal of the ACM 45 6 (Nov. 1998) 965-981
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
12
-
-
45949106550
-
-
Hansen M. Marrying transparency tools with user-controlled identity management. In: Proceedings of the IFIP & FIDIS summer school 2007. IFIP Publisher Springer Science and Business Media; 2008. p. 199-222.
-
Hansen M. Marrying transparency tools with user-controlled identity management. In: Proceedings of the IFIP & FIDIS summer school 2007. IFIP Publisher Springer Science and Business Media; 2008. p. 199-222.
-
-
-
-
13
-
-
1642281602
-
Privacy enhancing identity management
-
Elsevier 1, p. 35-44
-
Hansen M., Berlich P., Camenisch J., Clauß S., Pfitzmann A., and Waidner M. Privacy enhancing identity management. Information security technical report vol. 9 (2004), Elsevier 1, p. 35-44
-
(2004)
Information security technical report
, vol.9
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clauß, S.4
Pfitzmann, A.5
Waidner, M.6
-
14
-
-
84902170557
-
-
Hansen M., and Meissner S. (Eds), Lulu Inc. [current June 2008]
-
In: Hansen M., and Meissner S. (Eds). Verkettung digitaler Identitäten (2007), Lulu Inc. https://www.datenschutzzentrum.de/projekte/verkettung/ [current June 2008]
-
(2007)
Verkettung digitaler Identitäten
-
-
-
16
-
-
52949107496
-
-
Leenes R., Schallaböck J., and Hansen M. (Eds) [current June 2008]
-
In: Leenes R., Schallaböck J., and Hansen M. (Eds). PRIME white paper (2007). https://www.prime-project.eu/prime_products/whitepaper/ [current June 2008]
-
(2007)
PRIME white paper
-
-
-
17
-
-
39749199849
-
Useful void: the art of forgetting in the age of ubiquitous computing
-
John F. Kennedy School of Government - Harvard University [current June 2008]
-
Mayer-Schönberger V. Useful void: the art of forgetting in the age of ubiquitous computing. Faculty research working papers series no. RWP07-022 (Apr. 2007), John F. Kennedy School of Government - Harvard University. http://ksgnotes1.harvard.edu/Research/wpaper.nsf/rwp/RWP07-022/$File/rwp_07_022_mayer-schoenberger.pdf [current June 2008]
-
(2007)
Faculty research working papers series no. RWP07-022
-
-
Mayer-Schönberger, V.1
-
19
-
-
52949120928
-
Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology
-
[current June 2008]
-
Pfitzmann A., and Hansen M. Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Working paper v0.31 (Feb. 2008). http://dud.inf.tu-dresden.de/Anon_Terminology.shtml [current June 2008]
-
(2008)
Working paper v0.31
-
-
Pfitzmann, A.1
Hansen, M.2
-
20
-
-
41949104374
-
Secure and anonymous electronic commerce: providing legal certainty in open digital systems without compromising anonymity
-
IBM Research Division, Zurich [current June 2008]
-
Pfitzmann B., Waidner M., and Pfitzmann A. Secure and anonymous electronic commerce: providing legal certainty in open digital systems without compromising anonymity. IBM research report RZ 3232 (#93278) 05/22/00 computer science/mathematics (May 2000), IBM Research Division, Zurich. http://www.semper.org/sirene/publ/PWP_00anoEcommerce.ps.gz [current June 2008]
-
(2000)
IBM research report RZ 3232 (#93278) 05/22/00 computer science/mathematics
-
-
Pfitzmann, B.1
Waidner, M.2
Pfitzmann, A.3
-
21
-
-
52949112167
-
Using population data systems to target vulnerable population subgroups and individuals: issues and incidents
-
Asher J., Banks D., and Scheuren F.J. (Eds), Springer
-
Seltzer W., and Anderson M. Using population data systems to target vulnerable population subgroups and individuals: issues and incidents. In: Asher J., Banks D., and Scheuren F.J. (Eds). Statistical methods for human rights (2008), Springer 273-328
-
(2008)
Statistical methods for human rights
, pp. 273-328
-
-
Seltzer, W.1
Anderson, M.2
-
22
-
-
0018545449
-
How to share a secret
-
no. 11, p. 612-3
-
Shamir A. How to share a secret. Communications of the ACM vol. 22 (Nov. 1979) no. 11, p. 612-3
-
(1979)
Communications of the ACM
, vol.22
-
-
Shamir, A.1
|