Privacy and Security in E-Learning
暂无分享,去创建一个
Khalil El-Khatib | George Yee | Larry Korba | Yuefei Xu | L. Korba | Yuefei Xu | George Yee | K. El-Khatib
[1] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[2] W. Hodgins,et al. Into the future: A vision paper , 2000 .
[3] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[4] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[5] Michael Waidner,et al. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.
[6] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[7] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[8] Larry Korba,et al. Privacy in distributed electronic commerce , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[11] Pekka Nikander,et al. Users and Trust in Cyberspace , 2000, Security Protocols Workshop.
[12] Catherine A. Meadows,et al. The Role of Trust in Information Integrity Protocols , 1995, J. Comput. Secur..
[13] Yang-hua Chu. Trust management for the World Wide Web , 1997 .
[14] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[15] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[16] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[17] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[18] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[19] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.