Preserving Privacy in Caller ID Applications

[1]  Jaideep Ghosh The Blockchain: Opportunities for Research in Information Systems and Information Technology , 2019, Journal of Global Information Technology Management.

[2]  Wenyuan Xu,et al.  You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[3]  Yuri Gurevich,et al.  Inverse privacy , 2016, Commun. ACM.

[4]  Yuri Gurevich,et al.  Logic of infons: The propositional case , 2011, TOCL.

[5]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[6]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[7]  Jovanka Pantovic,et al.  Linked data privacy , 2015, Mathematical Structures in Computer Science.

[8]  Yuri Gurevich,et al.  Biggish: A Solution For The Inverse Privacy Problem , 2017 .

[9]  David A. Bell,et al.  Distributed database systems , 1992 .

[10]  Mingchun Zheng,et al.  A Differentiated Anonymity Algorithm for Social Network Privacy Preservation , 2016, Algorithms.

[11]  Narongsak Sukma,et al.  One time key Issuing for Verification and Detecting Caller ID Spoofing Attacks , 2017, 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[12]  K Bosworth,et al.  Entities, identities, identifiers and credentials — what does it all mean? , 2005 .