-
1
-
-
77950352511
-
-
HI: Harris Interactive, Survey on Medical Privacy (2004), http://www.harrisinteractive.com/news/newsletters/healthnews/ HI HealthCareNews2004Vol4 Iss13.pdf
-
(2004)
Survey on Medical Privacy
-
-
-
2
-
-
9144247839
-
Access to Electronic health records in primary care - A survey of patients' views
-
Pyper, C., Amery, J., Watson, M., Crook, C.: Access to Electronic health records in primary care - a survey of patients' views. Med. Sci. Monit. 10(11), 17-22 (2004)
-
(2004)
Med. Sci. Monit.
, vol.10
, Issue.11
, pp. 17-22
-
-
Pyper, C.1
Amery, J.2
Watson, M.3
Crook, C.4
-
3
-
-
77950352790
-
-
TCG: Trusted Computing Group (2008), http://www.trustedcomputinggroup.org
-
(2008)
-
-
-
5
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In:Workshop on Design Issues in Anonymity and Unobservability, pp. 1-9 (2000)
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
6
-
-
33645344483
-
A review of security of electronic health records
-
Win, K.T.: A review of security of electronic health records. HIM J. 34(1), 13-18 (2005)
-
(2005)
HIM J.
, vol.34
, Issue.1
, pp. 13-18
-
-
Win, K.T.1
-
8
-
-
58149354681
-
Privacy enhancing methods for ehealth applications: How to prevent statistical analyses and attacks
-
Stingl, C., Slamanig, D.: Privacy Enhancing Methods for eHealth Applications: How to Prevent Statistical Analyses and Attacks. Int. J. Business Intelligence and Data Mining 3, 236-254 (2008)
-
(2008)
Int. J. Business Intelligence and Data Mining
, vol.3
, pp. 236-254
-
-
Stingl, C.1
Slamanig, D.2
-
9
-
-
35248849922
-
Modelling unlinkability
-
Dingledine R. (ed.) PET 2003. Springer, Heidelberg
-
Steinbrecher, S., Köpsell, S.: Modelling Unlinkability. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.2760, pp. 32-47. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2760
, pp. 32-47
-
-
Steinbrecher, S.1
Köpsell, S.2
-
10
-
-
34548159019
-
A secure architecture for the pseudonymization of medical data
-
IEEE Computer Society, Los Alamitos
-
Riedl, B., Neubauer, T., Goluch, G., Boehm, O., Reinauer, G., Krumboeck, A.: A Secure Architecture for the Pseudonymization of Medical Data. In: Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 318-324. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the the Second International Conference on Availability Reliability and Security (ARES 2007)
, pp. 318-324
-
-
Riedl, B.1
Neubauer, T.2
Goluch, G.3
Boehm, O.4
Reinauer, G.5
Krumboeck, A.6
-
11
-
-
67650522224
-
A secure e-health architecture based on the appliance of pseudonymization
-
Riedl, B., Grascher, V., Neubauer, T.: A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software 3, 23-32 (2008)
-
(2008)
Journal of Software
, vol.3
, pp. 23-32
-
-
Riedl, B.1
Grascher, V.2
Neubauer, T.3
-
12
-
-
58149336618
-
Preserving privacy in a web-based multiuser-system (German)
-
Horster P. (ed.) IT-Verlag
-
Slamanig, D., Stingl, C., Lackner, G., Payer, U.: Preserving Privacy in a Web-based Multiuser-System (German). In: Horster, P. (ed.) Proceedings of DACH-Security 2007, pp. 98-110. IT-Verlag (2007)
-
(2007)
Proceedings of DACH-Security 2007
, pp. 98-110
-
-
Slamanig, D.1
Stingl, C.2
Lackner, G.3
Payer, U.4
-
14
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R.,Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, p. 21 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
15
-
-
26844534244
-
Privacy enhanced technologies: Methods, markets, misuse
-
Katsikas, S.K., Ĺopez, J., Pernul, G. (eds.) TrustBus 2005. Springer, Heidelberg
-
Federrath, H.: Privacy Enhanced Technologies: Methods, Markets, Misuse. In: Katsikas, S.K., Ĺopez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.3592, pp. 1-9. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3592
, pp. 1-9
-
-
Federrath, H.1
-
16
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
Washington, DC, USA IEEE Computer Society, Los Alamitos
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 2-15. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
SP 2003 Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
19
-
-
84956867779
-
Anonymous authentication of membership in dynamic groups
-
Franklin M.K. (ed.) FC 1999. Springer, Heidelberg
-
Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.1648, pp. 184-195. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1648
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
20
-
-
84921018856
-
A practical and provably secure coalition- resistant group signature scheme
-
Bellare M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Ateniese, G., Camenisch, J., Joye,M., Tsudik, G.: A Practical and Provably Secure Coalition- Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
21
-
-
85024290278
-
Group signatures
-
Davies D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
22
-
-
84946833891
-
How to Leak a Secret
-
Boyd C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
23
-
-
35048854233
-
Anonymous identification in Ad hoc groups
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 609-626. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
24
-
-
79960836060
-
Deniable ring authentication
-
Yung M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.2442, pp. 481-498. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
25
-
-
67650540135
-
Realization of a secure and centralized data repository (German)
-
Horster P. (ed.) IT-Verlag
-
Stingl, C., Slamanig, D., Rauner-Reithmayer, D., Fischer, H.: Realization of a Secure and Centralized Data Repository (German). In: Horster, P. (ed.) Proceedings of DACH Security 2006, pp. 32-45. IT-Verlag (2006)
-
(2006)
Proceedings of DACH Security 2006
, pp. 32-45
-
-
Stingl, C.1
Slamanig, D.2
Rauner-Reithmayer, D.3
Fischer, H.4
-
26
-
-
33646153291
-
Privacy-preserving electronic health records
-
Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. Springer, Heidelberg
-
Demuynck, L., Decker, B.D.: Privacy-Preserving Electronic Health Records. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.3677, pp. 150-159. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3677
, pp. 150-159
-
-
Demuynck, L.1
Decker, B.D.2
-
27
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84-90 (1981)
-
(1981)
Commun. ACM
, vol.24
, pp. 84-90
-
-
Chaum, D.1
-
28
-
-
49049117866
-
Privacy aspects of ehealth
-
IEEE Computer Society, Los Alamitos
-
Slamanig, D., Stingl, C.: Privacy Aspects of eHealth. In: Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 1226-1233. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the the Third International Conference on Availability Reliability and Security (ARES 2008)
, pp. 1226-1233
-
-
Slamanig, D.1
Stingl, C.2
|