-
1
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
of Lecture Notes in Computer Science, Springer-Verlag,1996
-
Bellare M., Canetti R. & Krawczyk H. (1996), Keying Hash Functions for Message Authentication, In Koblitz, N., ed.: Advances in Cryptology CRYPTO 96, Volume 1109 of Lecture Notes in Computer Science, Springer-Verlag,1996.
-
(1996)
Koblitz, N., ed.: Advances in Cryptology CRYPTO 96
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
34548396941
-
Preserving User Location Privacy in Mobile Data Management Infrastructures
-
Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006), Preserving User Location Privacy in Mobile Data Management Infrastructures, in 6th Workshop on Privacy Enhancing Technologies(PET'06), Cambridge, UK.
-
(2006)
6th Workshop on Privacy Enhancing Technologies(PET'06), Cambridge, UK
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
3
-
-
84871200813
-
Analysis of Privacy Protection Technologies
-
CWA 15263, Privacy Management Systems (PMS) and Identity Management systems (IMS), the Drivers thereof and the need for standardization, European Committee for Standardization (CEN), Brussels, 2005
-
CWA 15263 (2005), Analysis of Privacy Protection Technologies, Privacy- Enhancing Technologies (PET), Privacy Management Systems (PMS) and Identity Management systems (IMS), the Drivers thereof and the need for standardization, European Committee for Standardization (CEN), Brussels, 2005.
-
(2005)
Privacy- Enhancing Technologies (PET)
-
-
-
5
-
-
0003187764
-
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data,23 November
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data,23 November 1995, Official Journal of the European Communities L 281 p. 31.
-
(1995)
Official Journal of the European Communities
, vol.L281
, pp. 31
-
-
-
6
-
-
24944574585
-
-
Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications),12 July
-
Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications),12 July 2002, Official Journal of the European Communities L 201/37.
-
(2002)
Official Journal of the European Communities
, vol.L201
, pp. 37
-
-
-
7
-
-
0013176783
-
IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms, Springer Scientific Publishers
-
LNCS 1958, May, ISBN 3-540-42142-4
-
Fischer-Hübner S., IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms, Springer Scientific Publishers, Lecture Notes of Computer Science, LNCS 1958, May 2001, ISBN 3-540-42142-4.
-
(2001)
Lecture Notes of Computer Science
-
-
Fischer-Hübner, S.1
-
8
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Applications, and Services (MobiSys), San Francisco, USA
-
Gruteser, M. & Grunwald, D. (2003), Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, in Proceedings of The First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), San Francisco, USA, pp. 31-42.
-
(2003)
Proceedings of The First ACM/USENIX International Conference on Mobile Systems
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
9
-
-
84871218479
-
A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms
-
Jorns, O., Jung, O., Gross, J. & Bessler, S., A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms, TrustBus'05, Copenhagen, Denmark, 2005.
-
(2005)
TrustBus'05, Copenhagen, Denmark
-
-
Jorns, O.1
Jung, O.2
Gross, J.3
Bessler, S.4
-
10
-
-
55849093822
-
-
AISW2005, Australia
-
Jøsang A., Fabre J., Hay B., Dalziel J. & Pope S., Trust Requirements in Identity Management, AISW2005, Australia, 2005.
-
(2005)
Trust Requirements in Identity Management
-
-
Jøsang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
13
-
-
24644486618
-
Privacy for Profitable Location Based Services
-
Conference on Security in Pervasive Computing, Lecture Notes in Computer Science LNCS 3450, Springer, Berlin, Germany
-
Kölsch T., Fritsch L., Hohlweiss M. & Kesdogan D.:Privacy for Profitable Location Based Services, Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing, Lecture Notes in Computer Science (LNCS 3450, pp.164-179), Springer, Berlin, Germany, 2005.
-
(2005)
Proceedings of the 2nd Intl
, pp. 164-179
-
-
Kölsch, T.1
Fritsch, L.2
Hohlweiss, M.3
Kesdogan, D.4
-
14
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport L.: Password Authentication with Insecure Communication, Communications of the ACM, vol. 24(11), 1981, pp. 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
15
-
-
84871238905
-
-
National Institute of Standards and Technology: Secure hash standard (SHS)
-
National Institute of Standards and Technology: Secure hash standard (SHS). Federal Information Processing Standards Publication 180-2, 2002.
-
(2002)
Federal Information Processing Standards Publication
, vol.180
, Issue.2
-
-
-
16
-
-
84871204357
-
Enforcement and Management Requirements
-
OMA (Open Mobile Alliance), Policy Evaluation, 12. June
-
OMA (Open Mobile Alliance), Policy Evaluation, Enforcement and Management Requirements, Candidate V1.0, 12. June 2005.
-
(2005)
Candidate
, vol.1
-
-
-
18
-
-
84937564790
-
Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology
-
Lecture Notes in Computer Science LNCS 2009, Springer-Verlag, Berlin, Germany
-
Pfitzmann, A., & Köhntopp, M., Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology, Proceedings of Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science (LNCS 2009, pp.1-9), Springer-Verlag, Berlin, Germany, 2001.
-
(2001)
Proceedings of Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
19
-
-
84871199453
-
The Law is Not Enough: Legislation and Privacy Enhancing Technology for Location-Aware Computing
-
Mobile-HCI 2004, Glasgow, Scotland
-
Price Blane A., The Law is Not Enough: Legislation and Privacy Enhancing Technology for Location-Aware Computing, Workshop on Location Systems Privacy and Control, Mobile-HCI 2004, Glasgow, Scotland, 2004.
-
(2004)
Workshop on Location Systems Privacy and Control
-
-
Blane, A.P.1
-
20
-
-
24944555091
-
A Lightweigth Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058
-
Rodden, T., Friday, A., Muller, H. & Dix, A. (2003), A Lightweigth Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol,2002.
-
(2003)
University of Nottingham and Lancaster University and University of Bristol, 2002
-
-
Rodden, T.1
Friday, A.2
Muller, H.3
Dix, A.4
-
21
-
-
19944371002
-
A Document Format for Expressing Privacy Preferences for Location Information
-
draft-ietf-geopriv-policy-08
-
Schulzrinne H., Tschofenig H., Morris J., Cuellar J.& Polk J., A Document Format for Expressing Privacy Preferences for Location Information, Internet-Draft, draft-ietf-geopriv-policy-08, 2006.
-
(2006)
Internet-Draft
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
-
22
-
-
1442278934
-
Location-Based Services:Models for Strategy Development in MCommerce
-
Technology Management for Reshaping the World (PICMET'03), Portland, Oregon, USA, 2003
-
Unni R., & Harmon R., (2003), Location-Based Services:Models for Strategy Development in MCommerce, in Proceedings of the 2003 Management of Engineering and Technology, Technology Management for Reshaping the World (PICMET'03), Portland, Oregon, USA, 2003.
-
(2003)
Proceedings of the 2003 Management of Engineering and Technology
-
-
Unni, R.1
Harmon, R.2
-
23
-
-
0001853125
-
The Computer for the Twenty-First Century
-
September 1991
-
Weiser M. (1991), The Computer for the Twenty-First Century, Scientific American, September 1991, pp. 94 - 100.
-
(1991)
Scientific American
, pp. 94-100
-
-
Weiser, M.1
-
24
-
-
57849153699
-
Zone Services An Approach for Locationbased Data Collection
-
IEEE, San Francisco, USA
-
Weiß, D., Krämer, I., Treu, G., & Küpper, A. (2006), Zone Services An Approach for Locationbased Data Collection, in Proceedings of The Third IEEE International Workshop on Mobile Commerce and Services (WMCS'06), IEEE, San Francisco, USA, pp. 504-511.
-
(2006)
Proceedings of The Third IEEE International Workshop on Mobile Commerce and Services (WMCS'06)
, pp. 504-511
-
-
Weiß, D.1
Krämer, I.2
Treu, G.3
Küpper, A.4
|