-
1
-
-
77958579053
-
Location privacy for cellular systems; Analysis and solution
-
Springer, LNCS 3856, Cavtat, Croatia
-
G.M. Køien and V.A. Oleshchuk, Location Privacy for Cellular Systems; Analysis and Solution, In Proc. of Privacy Enhancing Technologies workshop 2005, Springer, LNCS 3856, Cavtat, Croatia, 2005
-
(2005)
Proc. of Privacy Enhancing Technologies Workshop 2005
-
-
Køien, G.M.1
Oleshchuk, V.A.2
-
2
-
-
33749010622
-
Privacy enhanced cellular access security
-
Cologne, Germany
-
G.M. Køien, Privacy enhanced cellular access security, In Proceedings of the 4th ACM workshop on Wireless security, ACM WiSe '05, pp.57-66, Cologne, Germany, 2005
-
(2005)
Proceedings of the 4th ACM Workshop on Wireless Security, ACM WiSe '05
, pp. 57-66
-
-
Køien, G.M.1
-
3
-
-
85012229582
-
-
ACM, Nov.
-
G. Anthes, Security in the Cloud, Commun. ACM, Vol.53, No.11, Nov. 2010
-
(2010)
Security in the Cloud, Commun.
, vol.53
, Issue.11
-
-
Anthes, G.1
-
4
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
ACM CCSW09
-
M. Christodorescu and R. Sailer and D.L. Schales and D. Sgandurra and D. Zamboni, Cloud security is not (just) virtualization security: a short paper, In Proceedings of the 2009 ACM workshop on Cloud computing security, pp.97-102, ACM CCSW09, 2009
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
5
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM CCS '09
-
T. Ristenpart and E. Tromer and H. Shacham and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, In Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, ACM CCS '09, 2009
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
6
-
-
0010868622
-
The right to privacy harward law review
-
Dec. 1890, Wadsworth Publ. Co. Belmont, CA, USA
-
S.D. Warren and L.D. Brandeis, The Right to Privacy, Harward Law Review, Vol.IV, No.5, Dec.1890, In "Ethical issues in the use of computers", pp.172-183, Wadsworth Publ. Co. Belmont, CA, USA, 1985
-
(1985)
Ethical Issues in the Use of Computers
, vol.5
, Issue.5
, pp. 172-183
-
-
Warren, S.D.1
Brandeis, L.D.2
-
7
-
-
58249119873
-
-
G.M. Køien and V.A. Oleshchuk, Personal Privacy in a Digital World, Telektronikk Vol.103, No.2,pp.4-19, 2007
-
(2007)
Personal Privacy in A Digital World, Telektronikk
, vol.103
, Issue.2
, pp. 4-19
-
-
Køien, G.M.1
Oleshchuk, V.A.2
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D.L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM, Vol.24, No.2, Feb. 1981
-
(1981)
Commun. ACM
, vol.24
, Issue.2
-
-
Chaum, D.L.1
-
13
-
-
0347608169
-
A logic of uncertain probabilities
-
June
-
A. Jøsang, A Logic of Uncertain Probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279-311, June 2001.
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Jøsang, A.1
-
15
-
-
79960907469
-
K-anonymity
-
Springer
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, k-Anonymity. In: Advances in Information Security, Springer, 2007.
-
(2007)
Advances in Information Security
-
-
Ciriani, V.1
De Capitani, S.2
Vimercati, D.3
Foresti, S.4
Samarati, P.5
-
16
-
-
79960916087
-
Former NSA tech chief: I don't trust the cloud
-
T. Greene, Former NSA tech chief: I don't trust the cloud. Network World, 2010.
-
(2010)
Network World
-
-
Greene, T.1
-
17
-
-
85054263771
-
-
Chapman and Hall/CRC,August
-
B. C. M. Fung , K. Wang , A. Wai-Chee Fu and P. S. Yu, Introduction to Privacy-Preserving Data Publishing Concepts and Techniques, Chapman and Hall/CRC,August 2010.
-
(2010)
Introduction to Privacy-Preserving Data Publishing Concepts and Techniques
-
-
Fung, B.C.M.1
Wang, K.2
Fu, A.W.-C.3
Yu, P.S.4
|