Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Markus Jakobsson,et al. Privacy-preserving global customization , 2000, EC '00.
[3] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[4] David M. Kristol,et al. HTTP State Management Mechanism , 2000, RFC.
[5] Paul F. Syverson,et al. Private Web Browsing , 1997, J. Comput. Secur..
[6] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[7] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[8] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[9] Danny B. Lange,et al. Programming and Deploying Mobile Agents with Java Aglets , 1998 .
[10] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[11] Dirk Westhoff,et al. Protecting a Mobile Agent's Route against Collusions , 1999, Selected Areas in Cryptography.
[12] Paul F. Syverson,et al. Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[13] Ari Juels,et al. Targeted Advertising ... And Privacy Too , 2001, CT-RSA.
[14] Robert H. Deng,et al. Privacy Protection for Transactions of Digital Goods , 2001, ICICS.