-
2
-
-
21244454934
-
Uniform Resource Identifier (URI): Generic syntax
-
(Standard), Jan.
-
BERNERS-LEE, T., FIELDING, R., AND MASINTER, L. Uniform Resource Identifier (URI): Generic Syntax. RFC 3986 (Standard), Jan. 2005.
-
(2005)
RFC
, vol.3986
-
-
Berners-lee, T.1
Fielding, R.2
Masinter, L.3
-
3
-
-
0034449399
-
Regulating service access and information release on the web
-
(New York, NY, USA), ACM Press
-
BONATTI, P., AND SAMARATI, P. Regulating service access and information release on the web. In CCS '00: Proceedings of the 7th ACM conference on Computer and communications security (New York, NY, USA, 2000), ACM Press, pp. 134-143.
-
(2000)
CCS '00: Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Bonatti, P.1
Samarati, P.2
-
4
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
BONATTI, P. A., AND SAMARATI, P. A uniform framework for regulating service access and information release on the web. J. Comput. Secur. 10, 3 (2002), 241-271.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
5
-
-
77953593733
-
Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v1.2
-
Jan.
-
CAMENISCH, J. Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v1.2. Tech. rep., IBM Research, Jan. 2005.
-
(2005)
Tech. Rep., IBM Research
-
-
Camenisch, J.1
-
6
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
B. Pfitzmann, Ed. vol. 2045 of LNCS, Springer Verlag
-
CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology - EUROCRYPT 2001 (2001), B. Pfitzmann, Ed., vol. 2045 of LNCS, Springer Verlag, pp. 93-118.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
33749000965
-
A general certification framework with applications to privacy-enhancing certificate infrastructures
-
July
-
CAMENISCH, J., SOMMER, D., AND ZIMMERMANN, R. A general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. RZ 3629, IBM Zurich Research Laboratory, July 2005.
-
(2005)
Tech. Rep. RZ 3629, IBM Zurich Research Laboratory
-
-
Camenisch, J.1
Sommer, D.2
Zimmermann, R.3
-
8
-
-
33745921913
-
Dealing with privacy obligations: Important aspects and technical approaches
-
CASASSA MONT, M. Dealing with privacy obligations: Important aspects and technical approaches. In TrustBus 2004 (2004), pp. 120-131.
-
(2004)
TrustBus 2004
, pp. 120-131
-
-
Casassa Mont, M.1
-
10
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
10 (Oct.)
-
CHAUM, D. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28, 10 (Oct. 1985), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
12
-
-
0038150613
-
An internet attribute certificate profile for authorization
-
(Proposed Standard), Apr.
-
FARRELL, S., AND HOUSLEY, R. An Internet Attribute Certificate Profile for Authorization. RFC 3281 (Proposed Standard), Apr. 2002.
-
(2002)
RFC
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
13
-
-
0005063385
-
Onion routing for anonymous and private internetconnections
-
Feb.
-
GOLDSCHLAG, D. M., REED, M. G., AND SYVERSON, P. F. Onion routing for anonymous and private internetconnections. Communications of the ACM 42, 2 (Feb. 1999), 84-88.
-
(1999)
Communications of the ACM 42
, vol.2
, pp. 84-88
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
14
-
-
77953565379
-
-
Whitepaper, 18 July
-
HANSEN, M., AND KRASEMANN, H. Prime whitepaper. Whitepaper, 18 July 2005. http://www.prime-project.eu.org/prime/public/press-room/whitepaper/PRIME- Whitepaper-V1.pdf.
-
(2005)
Prime Whitepaper
-
-
Hansen, M.1
Krasemann, H.2
-
15
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
(Proposed Standard), Apr.
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
16
-
-
0038650644
-
Pseudonym systems
-
H. Heys and C. Adams, Eds. vol. 1758 of LNCS, Springer Verlag
-
LYSYANSKAYA, A., RIVEST, R., SAHAI, A., AND WOLF, S. Pseudonym systems. In Selected Areas in Cryptography (1999), H. Heys and C. Adams, Eds., vol. 1758 of LNCS, Springer Verlag.
-
(1999)
Selected Areas in Cryptography
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
20
-
-
33644661287
-
Open to exploitation: American shoppers online and offline
-
June
-
TUROW, J., FELDMAN, L., AND MELTZER, K. Open to exploitation: American shoppers online and offline. Tech. rep., Annenberg Public Policy Center, University of Pennsylvania, June 2005. http://www.annenbergpublicpolicycenter. org/04-info-society/Turow-APPC-Report-WEB-FINAL.pdf.
-
(2005)
Tech. Rep., University of Pennsylvania
-
-
Turow, J.1
Feldman, L.2
Meltzer, K.3
|