Preserving Privacy in Caller ID Applications
暂无分享,去创建一个
[1] Jaideep Ghosh. The Blockchain: Opportunities for Research in Information Systems and Information Technology , 2019, Journal of Global Information Technology Management.
[2] Wenyuan Xu,et al. You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[3] Yuri Gurevich,et al. Inverse privacy , 2016, Commun. ACM.
[4] Yuri Gurevich,et al. Logic of infons: The propositional case , 2011, TOCL.
[5] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[6] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Jovanka Pantovic,et al. Linked data privacy , 2015, Mathematical Structures in Computer Science.
[8] Yuri Gurevich,et al. Biggish: A Solution For The Inverse Privacy Problem , 2017 .
[9] David A. Bell,et al. Distributed database systems , 1992 .
[10] Mingchun Zheng,et al. A Differentiated Anonymity Algorithm for Social Network Privacy Preservation , 2016, Algorithms.
[11] Narongsak Sukma,et al. One time key Issuing for Verification and Detecting Caller ID Spoofing Attacks , 2017, 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[12] K Bosworth,et al. Entities, identities, identifiers and credentials — what does it all mean? , 2005 .