|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 75 occurrences of 39 keywords
|
|
|
Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Nabil Ajam, Ahmed Bouabdallah |
Privacy Improvement through Pseudonymity in Parlay X for Location Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 713-718, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Parlay X, web services, Privacy, Location based services, formal model, Pseudonymity |
91 | Daniel Cvrcek, Václav Matyás Jr. |
Pseudonymity in the Light of Evidence-Based Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 267-274, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
88 | Herbjørn Andresen |
The Policy Debate on Pseudonymous Health Registers in Norway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOSTEC (Selected Papers) ![In: Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Funchal, Madeira, Portugal, January 28-31, 2008, Revised Selected Papers, pp. 413-424, 2008, Springer, 978-3-540-92218-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public Health Policy, Privacy Regulation, Confidentiality, Data Security, Pseudonymity |
73 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 7th International Conference,WAIM 2006, Hong Kong, China, June 17-19, 2006, Proceedings, pp. 193-204, 2006, Springer, 3-540-35225-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Role, Privacy Protection, Pseudonymity |
52 | Alfred Kobsa, Jörg Schreck |
Privacy through pseudonymity in user-adaptive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 3(2), pp. 149-183, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Chaum mix, security, privacy, access control, personalization, User modeling, anonymity, encryption, reference model, pseudonymity, secrecy, personal information, KQML, user-adaptive systems |
49 | Andreas Pfitzmann, Marit Köhntopp |
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 1-9, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 37-45, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
45 | Joachim Biskup, Ulrich Flegel |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 28-48, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity |
42 | Filippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson |
IntelliShopper: a proactive, personal, private shopping assistant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 1001-1008, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
pro-activity, privacy, learning, personalization, monitoring, shopping |
28 | Victor Sucasas, Georgios Mantas, Maria Papaioannou, Jonathan Rodriguez 0001 |
Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 11(1), pp. 168-184, January - March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Nardine Basta, Ming Ding 0001, Muhammad Ikram 0001, Mohamed Ali Kâafar |
5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.10673, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Aayush Gupta, Kobi Gurkan |
An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1255, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Victor Sucasas, Georgios Mantas, Joaquim Bastos, Francisco Damião, Jonathan Rodriguez 0001 |
A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 19(4), pp. 752-768, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien |
Risk Analysis on C-ITS Pseudonymity Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NTMS ![In: 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019, Canary Islands, Spain, June 24-26, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-1542-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Sarah-Kristin Thiel, Ida Larsen-Ledet |
The Role of Pseudonymity in Mobile e-Participation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 52nd Hawaii International Conference on System Sciences, HICSS 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019, pp. 1-10, 2019, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
28 | Simone Fischer-Hübner |
Pseudonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems (2nd ed.) ![In: Encyclopedia of Database Systems, Second Edition, 2018, Springer, 978-1-4614-8266-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Sarah Maltby, Helen Thornham, Daniel Bennett |
Beyond 'pseudonymity': The sociotechnical structure of online military forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 20(5), pp. 1773-1791, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Alexander Gabel, Ina Schiering |
Privacy Patterns for Pseudonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, pp. 155-172, 2018, Springer, 978-3-030-16743-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yaron Kanza, Eliyahu Safra |
Cryptotransport: blockchain-powered ride hailing while preserving privacy, pseudonymity and trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSPATIAL/GIS ![In: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2018, Seattle, WA, USA, November 06-09, 2018, pp. 540-543, 2018, ACM, 978-1-4503-5889-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Zhaoyan Ming, Tat-Seng Chua |
Resolving polysemy and pseudonymity in entity linking with comprehensive name and context modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 307, pp. 18-38, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Emily van der Nagel, Jordan Frith |
Anonymity, pseudonymity, and the agency of online identity: Examining the social practices of r/Gonewild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
First Monday ![In: First Monday 20(3), 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan 0001 |
Privacy through Pseudonymity in Mobile Telephony Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014, 2014, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
28 | Ho Lee, Jaewon Choi, Kyung Kyu Kim |
Impact of Anonymity (Unlinkability, Pseudonymity, Unobservability) on Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 17th Pacific Asia Conference on Information Systems, PACIS 2013, Jeju Island, Korea, June 18-22, 2013, pp. 70, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
28 | Ben Dalton |
Pseudonymity in social machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume, pp. 897-900, 2013, International World Wide Web Conferences Steering Committee / ACM, 978-1-4503-2038-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Michail Tsikerdekis |
The choice of complete anonymity versus pseudonymity for aggression online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e Minds Int. J. Hum. Comput. Interact. ![In: e Minds Int. J. Hum. Comput. Interact. 2(8), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
28 | Wataru Oogami, Takaaki Komura, Yasuo Okabe |
Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012, pp. 64-69, 2012, IEEE Computer Society, 978-1-4673-2714-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Monica J. Barratt |
Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C&T ![In: Proceedings of the Fifth International Conference on Communities and Technologies, C&T 2011, Brisbane, QLD, Australia, June 29 - July 2, 2011, pp. 159-168, 2011, ACM, 978-1-4503-0824-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Binod Vaidya, Joel J. P. C. Rodrigues, Jong Hyuk Park |
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 23(9-10), pp. 1201-1222, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Florian Schaub, Frank Kargl, Zhendong Ma, Michael Weber 0001 |
V-Tokens for Conditional Pseudonymity in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: 2010 IEEE Wireless Communications and Networking Conference, WCNC 2010, Proceedings, Sydney, Australia, 18-21 April 2010, pp. 1-6, 2010, IEEE, 978-1-4244-6398-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Simone Fischer-Hübner |
Pseudonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 2207, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Joni Hahkala, Henri Mikkonen, Mika Silander, John White |
A Pseudonymity System for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 4(5), pp. 415-422, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
28 | Martin Neubauer |
Modelling of Pseudonymity under Probabilistic Linkability Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 160-167, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Emanuel Fonseca, Andreas Festag, Roberto Baldessari, Rui L. Aguiar |
Support of Anonymity in VANETs - Putting Pseudonymity into Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007, pp. 3400-3405, 2007, IEEE, 1-4244-0658-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Cvrcek |
Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 275, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Josyula R. Rao, Pankaj Rohatgi |
Can Pseudonymity Really Guarantee Privacy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000, 2000, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
28 | A. Michael Froomkin |
Legal Issues in Anonymity and Pseudonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 15(2), pp. 113-127, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 28(2), pp. 37-38, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 37-38, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
24 | Janne Lindqvist, Juha-Matti Tapio |
Protecting privacy with protocol stack virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 65-74, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protocol stack virtualization, privacy, pseudonymity |
24 | Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 |
Privacy enhanced personalization in e-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 42, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, trust, personalization, anonymity, reputation, identity, pseudonymity |
24 | Thibault Candebat, Cameron Ross Dunne, David T. Gray |
Pseudonym management using mediated identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 1-10, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SEM architecture, location-based services, identity-based encryption, pseudonymity |
24 | Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, David Hutchison 0001 |
Towards Pseudonymous e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 4(1-2), pp. 83-111, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pseudonymous payment, pseudonymous credit cards, privacy, trust, e-commerce, anonymity, pseudonymity, Mix-networks |
24 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA, June 1-3, 2003, pp. 291-302, 2003, ACM, 1-58113-684-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
24 | Marc Rennhard, Bernhard Plattner, Sandro Rafaeli, Laurent Mathy, David Hutchison 0001 |
An Architecture for an Anonymity Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 165-170, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
anonymous Web browsing, Anonymity, pseudonymity, mix-networks |
24 | Joachim Biskup, Ulrich Flegel |
Threshold-based identity recovery for privacy enhanced applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 71-79, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
purpose binding, privacy, anonymity, secret sharing, pseudonymity |
21 | Ibrahim Armac, Daniel Rose |
Privacy-friendly user modelling for smart environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland, 2008, ICST / ACM, 978-963-9799-27-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
personalization, user model, smart environments |
21 | Peter Schartner, Martin Schaffer |
Unique User-Generated Digital Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 194-205, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi |
A user-centric anonymous authorisation framework in e-commerce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 138-147, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Marc Langheinrich |
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: Ubicomp 2001: Ubiquitous Computing, Third International Conference Atlanta, Georgia, USA, September 30 - October 2, 2001, Proceedings, pp. 273-291, 2001, Springer, 3-540-42614-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack |
Privacy Engineering for Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 76-105, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Richard Clayton 0001, George Danezis, Markus G. Kuhn |
Real World Patterns of Failure in Anonymity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 230-244, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #51 of 51 (100 per page; Change: )
|
|