A New Fuzzy-Based Approach for Anonymity Quantification in E-Services
暂无分享,去创建一个
[1] Jun Zheng,et al. Handbook of Research on Wireless Security , 2008 .
[2] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[3] Jar-Yuan Pai,et al. The evaluation of implementing the international organization for standardization (ISO) 9000 quality management system in medical setting: A study from a teaching hospital , 2012 .
[4] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[5] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[6] Fikret Sivrikaya,et al. A Combinatorial Approach to Measuring Anonymity , 2007, 2007 IEEE Intelligence and Security Informatics.
[7] George J. Klir,et al. Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems - Selected Papers by Lotfi A Zadeh , 1996, Advances in Fuzzy Systems - Applications and Theory.
[8] M.S.M. Noorani,et al. Mathematical Treatment for Constructing a countermeasure against the one time pad attack on the Baptista Type Cryptosystem , 2011 .
[9] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[10] S. Sivanandam,et al. Introduction to Fuzzy Logic using MATLAB , 2006 .
[11] J. J. Saade,et al. DEFUZZIFICATION METHODS AND NEW TECHNIQUES FOR FUZZY CONTROLLERS , 2004 .
[12] Salim Chikhi,et al. A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System , 2014, Int. J. Inf. Secur. Priv..
[13] Riccardo Bettati,et al. Anonymity vs. Information Leakage in Anonymity Systems , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[14] Siu-Ming Yiu,et al. Event-Oriented k-Times Revocable-iff-Linked Group Signatures , 2006, ACISP.
[15] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[16] Carmela Troncoso,et al. Revisiting a combinatorial approach toward measuring anonymity , 2008, WPES '08.
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] Claudia Díaz. Anonymity Metrics Revisited , 2005, Anonymous Communication and its Applications.
[19] Giovanni Caire,et al. JADE Programmer's Guide , 2002 .
[20] Bill Bailey,et al. Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology , 2012 .
[21] Dang Vinh Pham,et al. Discussing Anonymity Metrics for Mix Based Anonymity Approaches , 2009, iNetSeC.
[22] Gordon B. Agnew,et al. Security measures for mobile ad-hoc networks (MANETs) , 2008 .
[23] Santo Banerjee,et al. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption , 2010 .
[24] Lotfi A. Zadeh,et al. A note on web intelligence, world knowledge and fuzzy logic , 2004, Data Knowl. Eng..
[25] Vitaly Shmatikov,et al. Measuring relationship anonymity in mix networks , 2006, WPES '06.
[26] Nicholas R. Jennings,et al. Agent Theories, Architectures, and Languages: A Survey , 1995, ECAI Workshop on Agent Theories, Architectures, and Languages.