-
3
-
-
0347178887
-
-
Computer Security Institute (CSI)
-
Computer Security Institute (CSI). Computer Crime and Security Survey 2007. http://www.gocsi.com/forms/csi survey.jhtml
-
Computer Crime and Security Survey 2007
-
-
-
4
-
-
84864087027
-
Cloud Computing & SaaS In 2010-What To Expect After The Uncertainty & Hype Fade
-
Gain, B. Cloud Computing & SaaS In 2010-What To Expect After The Uncertainty & Hype Fade. Processor 32(1), 2010.
-
(2010)
Processor
, vol.32
, Issue.1
-
-
Gain, B.1
-
7
-
-
33644682163
-
Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption
-
Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., and Sands, D.Z. Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. J Am Med Inform Assoc. 13 (2): 121-126, 2006.
-
(2006)
J Am Med Inform Assoc.
, vol.13
, Issue.2
, pp. 121-126
-
-
Tang, P.C.1
Ash, J.S.2
Bates, D.W.3
Overhage, J.M.4
Sands, D.Z.5
-
8
-
-
84875568307
-
Chronisch Kranke einstellen? Eine experimentelle Vignettenstudie unter Personalmanagern
-
In Martin Meidenbauer Verlag
-
Frick, U., Baer, N. et al. Chronisch Kranke einstellen? Eine experimentelle Vignettenstudie unter Personalmanagern. In Proc. FFH 2008, pages 45-50, Martin Meidenbauer Verlag, 2008.
-
(2008)
Proc. FFH 2008
, pp. 45-50
-
-
Frick, U.1
Baer, N.2
-
9
-
-
74349113474
-
On Technical Security Issues in Cloud Computing
-
In IEEE
-
Jensen, M., Schwenk, S., Gruschka, N., and Lo Iacono, L. On Technical Security Issues in Cloud Computing. In Proc. of the IEEE International Conference on Cloud Computing, pages 109-116. IEEE, 2009.
-
(2009)
Proc. of the IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, S.2
Gruschka, N.3
Lo Iacono, L.4
-
11
-
-
67650522224
-
Secure e-Health Architecture based on the Appliance of Pseudonymization
-
Riedl, B., Grascher, V., and Neubauer, T. A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software 3(2): 23-32, 2008.
-
(2008)
Journal of Software
, vol.3
, Issue.2
, pp. 23-32
-
-
Riedl, B.1
Grascher, V.2
Neubauer, T.A.3
-
12
-
-
33749405570
-
Patient bleibt Herr seiner Daten. Realisierung des eGK-Berechtigungs-konzepts -ber ein ticketbasiertes, virtuelles Dateisystem
-
Caumanns, J. Der Patient bleibt Herr seiner Daten. Realisierung des eGK-Berechtigungs-konzepts -ber ein ticketbasiertes, virtuelles Dateisystem. Informatik-Spektrum 29 (5): 323-331, 2006.
-
(2006)
Informatik-Spektrum
, vol.29
, Issue.5
, pp. 323-331
-
-
der Caumanns, J.1
-
13
-
-
52949085153
-
Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers
-
In IEEE Communications Society
-
Alhaqbani, B., Fidge, C. Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers. In Proc. of HealthComm 2008, pages 108 - 117, IEEE Communications Society, 2008.
-
(2008)
Proc. of HealthComm 2008
, pp. 108-117
-
-
Alhaqbani, B.1
Fidge, C.2
-
14
-
-
68349133104
-
Privacy Management Architecture for Patient-Controlled Personal Health Record System
-
Huda, N., Sonehara, N., and Yamada, S. A Privacy Management Architecture for Patient-Controlled Personal Health Record System. Journal of Engineering Science and Technology 4(2): 154-170, 2009.
-
(2009)
Journal of Engineering Science and Technology
, vol.4
, Issue.2
, pp. 154-170
-
-
Huda, N.1
Sonehara, N.2
Yamada, S.A.3
-
16
-
-
0035517699
-
Protecting Respondents-Identities in Microdata Release
-
Samarati, P. Protecting Respondents- Identities in Microdata Release. IEEE Trans. Knowl. Data Eng. 13(6): 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
17
-
-
0001868672
-
Optimal Asymmetric Encryption
-
In LNCSSpringer-Verlag
-
Bellare, M., and Rogaway, P.: Optimal Asymmetric Encryption. In Proc. of EUROCRYPT 1994. LNCS vol. 950, pages 92-111. Springer-Verlag, 1994.
-
(1994)
Proc. of EUROCRYPT 1994
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
85032883059
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
In LNCSSpringer-Verlag
-
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Proc. of CRYPTO 1984, LNCS vol. 196, pages 10-18. Springer-Verlag, 1984.
-
(1984)
Proc. of CRYPTO 1984
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
19
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
In LNCS Springer-Verlag
-
Cramer, R., Shoup, V.: APractical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In Proc. of CRYPTO 1998, LNCS vol. 1462, pages 13-25. Springer-Verlag 1998.
-
(1998)
Proc. of CRYPTO 1998
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
20
-
-
58149354681
-
Privacy-enhancing methods for e-health applications: How to prevent statistical analyses and attacks
-
Stingl, C. and Slamanig, D. Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks. Int. J. Bus. Intell. Data Min. 3(3): 236-254, 2008.
-
(2008)
Int. J. Bus. Intell. Data Min.
, vol.3
, Issue.3
, pp. 236-254
-
-
Stingl, C.1
Slamanig, D.2
-
21
-
-
49049117866
-
Privacy Aspects of eHealth
-
In IEEE Computer Society
-
Slamanig, D., and Stingl, C. Privacy Aspects of eHealth. In Proc. of ARES 2008, pages 1226-1233. IEEE Computer Society, 2008.
-
(2008)
Proc. of ARES 2008
, pp. 1226-1233
-
-
Slamanig, D.1
Stingl, C.2
-
22
-
-
38149068986
-
Deterministic and Efficiently Searchable Encryption
-
In LNCS. Springer-Verlag
-
Bellare, M., Boldyreva, A., O-Neill, A. Deterministic and Efficiently Searchable Encryption. In Proc. of CRYPTO 2007. LNCS, vol. 4622, pages 535-552. Springer-Verlag, 2007.
-
(2007)
Proc. of CRYPTO 2007
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O-Neill, A.3
-
23
-
-
50249171823
-
Survey of Anonymous Communication Channels
-
Microsoft Research
-
Danezis, G. and Diaz, C. A Survey of Anonymous Communication Channels. Technical Report MSRTR-2008-35, Microsoft Research, 2008.
-
(2008)
Technical Report MSRTR-2008-35
-
-
Danezis, G.1
Diaz, C.A.2
-
24
-
-
84921018856
-
Practical and Provably Secure Coalition-Resistant Group Signature Scheme
-
In LNCS Springer-Verlag
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In Proc. of CRYPTO 2000. LNCS, vol. 1880, pages 255-270. Springer-Verlag, 2000.
-
(2000)
Proc. of CRYPTO 2000
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.A.4
-
25
-
-
35048887476
-
Short Group Signatures
-
In LNCSSpringer-Verlag
-
Boneh, D., Boyen, X., Shacham, H. Short Group Signatures. In Proc. of CRYPTO 2004. LNCS, vol. 3152, pages 41-55. Springer-Verlag, 2004.
-
(2004)
Proc. of CRYPTO 2004
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
26
-
-
33745871113
-
k-Times Anonymous Authentication with a Constant Proving Cost
-
In LNCS. Springer-Verlag
-
Teranishi, I., Sako, K. k-Times Anonymous Authentication with a Constant Proving Cost. In Proc. of Public-Key Cryptography 2006. LNCS, vol. 3958, pages 525-542. Springer-Verlag, 2006.
-
(2006)
Proc. of Public-Key Cryptography 2006
, vol.3958
, pp. 525-542
-
-
Teranishi, I.1
Sako, K.2
-
27
-
-
74549164179
-
Practical Traceable Anonymous Identification
-
In INSTICC Press
-
Slamanig, D., Schartner, P., Stingl, C. Practical Traceable Anonymous Identification. In Proc. of SECRYPT 2009, pages 225-232. INSTICC Press, 2009.
-
(2009)
Proc. of SECRYPT 2009
, pp. 225-232
-
-
Slamanig, D.1
Schartner, P.2
Stingl, C.3
-
28
-
-
78651460019
-
Anonymous But Authorized Transactions Supporting Selective Traceability
-
In IEEE Communications Society
-
Slamanig, D., and Rass, S. Anonymous But Authorized Transactions Supporting Selective Traceability. In Proc. of SECRYPT 2010, IEEE Communications Society, 2010.
-
(2010)
Proc. of SECRYPT 2010
-
-
Slamanig, D.1
Rass, S.2
-
29
-
-
0018545449
-
How to Share a Secret
-
Shamir, A. How to Share a Secret. Commun. ACM 22(11): 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
In LNCS, Springer-Verlag
-
Benaloh, J.C., and Leichter, J. Generalized Secret Sharing and Monotone Functions. In Proc. of CRYPTO 1988. LNCS, vol. 403, pages 27-35, Springer-Verlag, 1988.
-
(1988)
Proc. of CRYPTO 1988
, vol.403
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
|