-
2
-
-
0037392527
-
Standards for XML and Web Services Security
-
G. M. Naedele, "Standards for XML and Web Services Security", IEEE Computer, pp. 96-98, 2003.
-
(2003)
IEEE Computer
, pp. 96-98
-
-
Naedele, G.M.1
-
3
-
-
57549115685
-
-
ETSI TS 101 903 v. 1.2.2, XML Advanced Electronic Signatures (XAdES), Technical Specification, 2004, http://uri.etsi.org/01903/v1.2.2/ ts-101903v010202p.pdf
-
ETSI TS 101 903 v. 1.2.2, "XML Advanced Electronic Signatures (XAdES)", Technical Specification, 2004, http://uri.etsi.org/01903/v1.2.2/ ts-101903v010202p.pdf
-
-
-
-
4
-
-
57549115150
-
-
A. Pfitzmann, M. Hansen. (2005). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version v0.23 Aug. 25, 2005.
-
A. Pfitzmann, M. Hansen. (2005). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version v0.23 Aug. 25, 2005.
-
-
-
-
5
-
-
0012207557
-
Consistent, yet anonymous, Web access with LPWA
-
Feb
-
E. Gabber, P. Gibbons, D. Kristol, Y. Matias, and A. Mayer, "Consistent, yet anonymous, Web access with LPWA," Communication ACM, vol. 42, no. 2, pp. 42-47, Feb. 1999.
-
(1999)
Communication ACM
, vol.42
, Issue.2
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.2
Kristol, D.3
Matias, Y.4
Mayer, A.5
-
6
-
-
40249087829
-
Towards a framework for connection anonymity. Annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
-
H. Tillwick, M. Olivier. Towards a framework for connection anonymity. Annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. ACM International Conference Proceeding Series, vol. 150, pp. 113-122, 2005.
-
(2005)
ACM International Conference Proceeding Series
, vol.150
, pp. 113-122
-
-
Tillwick, H.1
Olivier, M.2
-
7
-
-
57549092421
-
-
Øverlier, L., and Syverson, P.. Valet services: Improving hidden servers with a personal touch. In Proceedings of The 6th Workshop on Privacy Enhancing Technologies, Springer-Verlag, LNCS 4285, Cambridge, UK, June 28-30 (2006).
-
Øverlier, L., and Syverson, P.. Valet services: Improving hidden servers with a personal touch. In Proceedings of The 6th Workshop on Privacy Enhancing Technologies, Springer-Verlag, LNCS 4285, Cambridge, UK, June 28-30 (2006).
-
-
-
-
8
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Usenix Assoc
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," Proc. 13th Usenix Security Symp., Usenix Assoc, 2004, pp. 303-319; http://tor.eff.orgtor-design.pdf
-
(2004)
Proc. 13th Usenix Security Symp
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
9
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 10-29
-
-
Raymond, J.F.1
-
10
-
-
0019532104
-
-
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, in Communications of the ACM v 24 no 2 (Feb 1981).
-
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms", in Communications of the ACM v 24 no 2 (Feb 1981).
-
-
-
-
11
-
-
20444447364
-
Mixmaster protocol version 2
-
Technical report, Network Working Group, Internet-Draft
-
U. Moeller et al., Mixmaster protocol version 2, Technical report, Network Working Group, 2004, Internet-Draft.
-
(2004)
-
-
Moeller, U.1
-
12
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
Berkeley, CA
-
G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: Design of a type III anonymous remailer protocol, in IEEE Symposium on Security and Privacy, IEEE, Berkeley, CA, 2003.
-
(2003)
IEEE Symposium on Security and Privacy, IEEE
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
15
-
-
57549118624
-
-
Anonymizer, Inc
-
Anonymizer, Inc. http://www.anonymizer.com/.
-
-
-
-
17
-
-
34547284919
-
Tor rendezvous specification
-
Technical report, The Free Haven Project, February 2006
-
R. Dingledine and N. Mathewson. Tor rendezvous specification. Technical report, The Free Haven Project, February 2006. http://tor.eff.org/cvs/doc/rend- spec.txt.
-
-
-
Dingledine, R.1
Mathewson, N.2
-
18
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
M. K. Wright, M. Adler, B. N. Levine, C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7 (2004) 489-522.
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, pp. 489-522
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
20
-
-
33750277833
-
-
L. Øverlier, P. Syverson. Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE CS.
-
L. Øverlier, P. Syverson. Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE CS.
-
-
-
-
24
-
-
57449122183
-
Blind Certification of Public Keys
-
HPL-96-71, May 16, 1996
-
W. Mao. Blind Certification of Public Keys, HP Labs Technical Reports, HPL-96-71, May 16, 1996.
-
HP Labs Technical Reports
-
-
Mao, W.1
-
25
-
-
0003791651
-
Web Services Description Language (WSDL) 1.1
-
W3C Note
-
E. Christenssen et al. (2001). "Web Services Description Language (WSDL) 1.1", W3C Note, www.w3.org/TR/wsdl.
-
(2001)
-
-
Christenssen, E.1
-
26
-
-
27544460647
-
-
Schlimmer J, ed, September, Available
-
Schlimmer J., ed., (2004). "Web Services Policy Framework (WS-Policy)". September 2004. Available http://www-128.ibm.com/ developerworks/webservices/library/specificati on/ws-polfram/
-
(2004)
Web Services Policy Framework (WS-Policy)
-
-
-
27
-
-
33749072655
-
UDDI version 2.04 API Specification
-
T. Bellwood editor, Standard
-
T. Bellwood (editor). (2002). "UDDI version 2.04 API Specification", UDDI Committee Specification, OASIS Standard, www.oasis-open.org/committees/uddispec/doc/tcspecs.htm#uddiv2.
-
(2002)
UDDI Committee Specification
-
-
-
29
-
-
44349127361
-
A Federated Privacy-Enhancing Identity Management System (FPE-IMS)
-
S. Papastergiou, A. Karantjias, D. Polemi, "A Federated Privacy-Enhancing Identity Management System (FPE-IMS)", in The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2007.
-
(2007)
in The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
-
-
Papastergiou, S.1
Karantjias, A.2
Polemi, D.3
-
30
-
-
57549089317
-
-
Papastergiou S, Kaliontzoglou A., Polemi D.. Targeted SOA-based Identity Management Solutions. Computer Standards and Interfaces, Elsevier (to be accepted).
-
Papastergiou S, Kaliontzoglou A., Polemi D.. "Targeted SOA-based Identity Management Solutions". Computer Standards and Interfaces, Elsevier (to be accepted).
-
-
-
-
31
-
-
0004115867
-
-
1st Edition, Macmillan Technical Publishing
-
C. Adams, S. Lloyd, Understanding Public-Key Infrastructure - Concepts, Standards and Deployment Considerations, 1st Edition, Macmillan Technical Publishing, 1999.
-
(1999)
Understanding Public-Key Infrastructure - Concepts, Standards and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
33
-
-
34047267150
-
A Secure e-Ordering Web Service
-
Springer Boston, ISBN 978-0-387-39226-4, pp
-
Polemi, D., Papastergiou, S.. "A Secure e-Ordering Web Service", Project E-Society: Building Bricks, Springer Boston, Volume 226/2006, ISBN 978-0-387-39226-4, pp. 352-365.
-
(2006)
Project E-Society: Building Bricks
, vol.226
, pp. 352-365
-
-
Polemi, D.1
Papastergiou, S.2
-
34
-
-
57549086345
-
A Secure and Trustful e-Ordering Architecture (TOES) for Small and Medium size Enterprises (SMEs)
-
IdeaGroup Inc
-
Papastergiou, S., Polemi, D.. "A Secure and Trustful e-Ordering Architecture (TOES) for Small and Medium size Enterprises (SMEs)". International Journal of Information Security and Privacy, IdeaGroup Inc., 2007.
-
(2007)
International Journal of Information Security and Privacy
-
-
Papastergiou, S.1
Polemi, D.2
-
35
-
-
57549097722
-
-
A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Information Hiding (IH 2002). Springer-Verlag, LNCS (forthcoming), 2002.
-
A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Information Hiding (IH 2002). Springer-Verlag, LNCS (forthcoming), 2002.
-
-
-
-
36
-
-
34249080831
-
Service Oriented Architectures: Approaches, Technologies and Research Issues
-
M. Papazoglou, W. Heuvel, "Service Oriented Architectures: Approaches, Technologies and Research Issues", The VLDB Journal, Vol. 16, Issue 3, pp. 389-415, 2007
-
(2007)
The VLDB Journal
, vol.16
, Issue.3
, pp. 389-415
-
-
Papazoglou, M.1
Heuvel, W.2
-
37
-
-
0027711242
-
Denial of service
-
New York, NY, USA, ACM Press
-
R. M. Needham. Denial of service. In CCS'93:Proceedings of the 1st ACM conference on Computer and communications security, pages 151-153, New York, NY, USA, 1993. ACM Press.
-
(1993)
CCS'93:Proceedings of the 1st ACM conference on Computer and communications security
, pp. 151-153
-
-
Needham, R.M.1
|