-
1
-
-
77953963918
-
Privacy-preserving DRM
-
ser. IDTRUST '10. New York, NY, USA: ACM. [Online]
-
R. Perlman, C. Kaufman, and R. Perlner, "Privacy-preserving DRM," in Proceedings of the 9th Symposium on Identity and Trust on the Internet, ser. IDTRUST '10. New York, NY, USA: ACM, 2010, pp. 69-83. [Online]. Available: http://doi.acm.org/10.1145/1750389.1750399
-
(2010)
Proceedings of the 9th Symposium on Identity and Trust on the Internet
, pp. 69-83
-
-
Perlman, R.1
Kaufman, C.2
Perlner, R.3
-
2
-
-
33750274436
-
Privacy-preserving digital rights management
-
ser. Lecture Notes in Computer Science, Springer
-
C. Conrado, M. Petkovic, and W. Jonker, "Privacy-preserving digital rights management," in Secure Data Management, ser. Lecture Notes in Computer Science, vol. 3178. Springer, 2004, pp. 83-99.
-
(2004)
Secure Data Management
, vol.3178
, pp. 83-99
-
-
Conrado, C.1
Petkovic, M.2
Jonker, W.3
-
3
-
-
70350159316
-
-
National Institute of Standards and Technology (NIST), Special Publication 800-122, Apr.
-
E. McCallister, T. Grance, and K. Scarfone, "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)," National Institute of Standards and Technology (NIST), Special Publication 800-122, Apr. 2010.
-
(2010)
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
-
-
McCallister, E.1
Grance, T.2
Scarfone, K.3
-
4
-
-
79951606109
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Nov.
-
"Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," Official Journal L 281, Nov. 1995.
-
(1995)
Official Journal L
, vol.281
-
-
-
5
-
-
2642567004
-
DRM and privacy
-
georgetown Public Law Research Paper No. 372741
-
J. E. Cohen, "DRM AND PRIVACY," Berkeley Technology Law Journal, vol. 18, pp. 575-617, 2003, georgetown Public Law Research Paper No. 372741.
-
(2003)
Berkeley Technology Law Journal
, vol.18
, pp. 575-617
-
-
Cohen, J.E.1
-
6
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
IEEE Computer Society
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in In MobiQuitous. IEEE Computer Society, 2005, pp. 109-117.
-
(2005)
MobiQuitous
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb. [Online]
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, Feb. 1978. [Online]. Available: http://doi.acm.org/10.1145/359340. 359342
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|