Flocks : distributed proxies for browsing privacy
暂无分享,去创建一个
[1] Martin S. Olivier. Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks , 2005, IFIP Int. Conf. Digital Forensics.
[2] A Lewis,et al. The Role of Technology , 2005, Literacy and Augmentative and Alternative Communication.
[3] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[4] Tomaz Klobucar,et al. Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.
[5] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[6] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[7] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[8] Martin S. Olivier. Flocks : distributed proxies for browsing privacy : reviewed article , 2005 .
[9] Michael Waidner,et al. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.
[10] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[11] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[13] M. A. Caloyannides. Encryption wars: shifting tactics , 2000 .
[14] Paul Ashley,et al. E-P3P privacy policies and privacy authorization , 2002, WPES '02.
[15] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[16] Martin S. Olivier. A layered architecture for privacy - enhancing technologies , 2003, South Afr. Comput. J..
[17] George Lawton. Is Technology Meeting the Privacy Challenge? , 2001, Computer.
[18] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.