-
1
-
-
85113917062
-
-
Mobestream Media, “Key Ring,” http://keyringapp.com/, 2013.
-
(2013)
Key Ring
-
-
-
2
-
-
85113944254
-
-
Snapp', “FidMe,” http://www.fidme.com/en/home.html, 2013.
-
(2013)
FidMe
-
-
-
3
-
-
85114001388
-
-
PunchTab, “PunchTab,” https://www.punchtab.com/, 2013.
-
(2013)
PunchTab
-
-
-
4
-
-
85114001576
-
-
Apple, “Passbook,” https://www.apple.com/ios/whats-new/ #passbook, 2013.
-
(2013)
Passbook
-
-
-
10
-
-
84959314705
-
Consumer privacy and marketing avoidance
-
Cambridge University Press
-
I. horn Hann, K. lung Hui, T. S. Lee, and I. P. L. Png, “Consumer privacy and marketing avoidance,” in Equilibrium Analysis: Essays in Honor of. Cambridge University Press, 2005.
-
(2005)
Equilibrium Analysis: Essays in Honor of
-
-
Hann, I.H.1
Hui, K.L.2
Lee, T.S.3
Png, I.P.L.4
-
11
-
-
84977836359
-
Customer loyalty programs and privacy concerns
-
O. Hinz, E. Gerstmeier, O. Tafreschi, M. Enzmann, and M. Schneider, “Customer loyalty programs and privacy concerns,” in Proceedings of BLED 2007, 2007.
-
(2007)
Proceedings of BLED 2007
-
-
Hinz, O.1
Gerstmeier, E.2
Tafreschi, O.3
Enzmann, M.4
Schneider, M.5
-
12
-
-
4544365511
-
A privacy-friendly loyalty system for electronic marketplaces
-
march
-
M. Enzmann and M. Schneider, “A privacy-friendly loyalty system for electronic marketplaces,” in IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE'04, march 2004, pp. 385 - 393.
-
(2004)
IEEE International Conference on E-Technology, E-Commerce and E-Service, 2004. EEE'04
, pp. 385-393
-
-
Enzmann, M.1
Schneider, M.2
-
13
-
-
84857073321
-
Impeding individual user profiling in shopper loyalty programs
-
Berlin, Heidelberg: Springer-Verlag
-
P. Marquardt, D. Dagon, and P. Traynor, “Impeding individual user profiling in shopper loyalty programs,” in Proceedings of the Financial Cryptography and Data Security, ser. FC'11. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 93-101.
-
(2012)
Proceedings of the Financial Cryptography and Data Security, Ser. FC'11
, pp. 93-101
-
-
Marquardt, P.1
Dagon, D.2
Traynor, P.3
-
17
-
-
84949935102
-
-
Internal report
-
M. Milutinovic, I. Dacosta, A. Put, and B. De Decker, “An efficient and unlinkable incentives scheme,” http://www.cs.kuleuven.be/publicaties/rapporten/cw/CW659.abs.html, Internal report, 2014.
-
(2014)
An Efficient and Unlinkable Incentives Scheme
-
-
Milutinovic, M.1
Dacosta, I.2
Put, A.3
de Decker, B.4
-
19
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, Ed. Springer Berlin Heidelberg, Online.
-
T. P. Pedersen, “Non-interactive and information-theoretic secure verifiable secret sharing,” in Advances in Cryptology CRYPTO 91, ser. Lecture Notes in Computer Science, J. Feigenbaum, Ed. Springer Berlin Heidelberg, 1992, vol. 576, pp. 129-140. [Online]. Available: http://dx.doi.org/10.1007/3-540-46766-1_9
-
(1992)
Advances in Cryptology CRYPTO 91, Ser. Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
20
-
-
84974652864
-
Provably secure partially blind signatures
-
M. Bellare, Ed. Springer Berlin Heidelberg
-
M. Abe and T. Okamoto, “Provably secure partially blind signatures,” in Advances in Cryptology CRYPTO 2000, ser. Lecture Notes in Computer Science, M. Bellare, Ed. Springer Berlin Heidelberg, 2000, vol. 1880, pp. 271-286.
-
(2000)
Advances in Cryptology CRYPTO 2000, Ser. Lecture Notes in Computer Science
, vol.1880
, pp. 271-286
-
-
Abe, M.1
Okamoto, T.2
-
21
-
-
84870663294
-
-
Giesecke & Devrient, “Mobile Security Card SE 1.0,” http://www.gd-sfs.com/the-mobile-security-card/mobile-security-card-se-1-0/.
-
Mobile Security Card SE 1.0
-
-
-
22
-
-
84975828388
-
Combining content-based and collaborative filters in an online newspaper
-
M. Claypool, A. Gokhale, T. Miranda, P. Murnikov, D. Netes, and M. Sartin, “Combining content-based and collaborative filters in an online newspaper.” Citeseer, 1999.
-
(1999)
Citeseer
-
-
Claypool, M.1
Gokhale, A.2
Miranda, T.3
Murnikov, P.4
Netes, D.5
Sartin, M.6
-
23
-
-
0036989477
-
Methods and metrics for cold-start recommendations
-
New York, NY, USA: ACM
-
A. I. Schein, A. Popescul, L. H. Ungar, and D. M. Pennock, “Methods and metrics for cold-start recommendations,” in Proceedings of the ACM conference on Research and development in information retrieval. New York, NY, USA: ACM, 2002, pp. 253-260.
-
(2002)
Proceedings of the ACM Conference on Research and Development in Information Retrieval
, pp. 253-260
-
-
Schein, A.I.1
Popescul, A.2
Ungar, L.H.3
Pennock, D.M.4
-
24
-
-
85113989635
-
Improving secure storage of data in android
-
Internal Report, March
-
F. Boukayoua, J. Lapon, B. D. Decker, and V. Naessens, “Improving secure storage of data in android,” KU Leuven, https://lirias.kuleuven.be/handle/123456789/446974, Internal Report, March 2014.
-
(2014)
KU Leuven
-
-
Boukayoua, F.1
Lapon, J.2
Decker, B.D.3
Naessens, V.4
-
25
-
-
85084161115
-
All your droid are belong to us: A survey of current android attacks
-
Berkeley, CA, USA: USENIX Association
-
T. Vidas, D. Votipka, and N. Christin, “All your droid are belong to us: A survey of current android attacks,” in Proceedings of the 5th USENIX Conference on Offensive Technologies, ser. WOOT'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 10-10.
-
(2011)
Proceedings of the 5th USENIX Conference on Offensive Technologies, Ser. WOOT'11
, pp. 10
-
-
Vidas, T.1
Votipka, D.2
Christin, N.3
-
26
-
-
84920879909
-
Mobile device encryption systems
-
Auckland, New Zealand, Jul
-
P. Teufl, T. Zefferer, and C. Stromberger, “Mobile device encryption systems,” in Proceedings of the 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, Auckland, New Zealand, Jul. 2013, p. 15.
-
(2013)
Proceedings of the 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference
, pp. 15
-
-
Teufl, P.1
Zefferer, T.2
Stromberger, C.3
|