Anonymity , Unlinkability , Unobservability , Pseudonymity , and Identity Management – A Consolidated Proposal for Terminology
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Robert Liebendorfer. Mind, self and society , 1960 .
[3] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[4] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[5] Michael Waidner,et al. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.
[6] David Chaum,et al. Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.
[7] Andreas Pfitzmann,et al. Value exchange systems enabling security and unobservability , 1990, Comput. Secur..
[8] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[9] Kenneth G. Wilson. The Columbia Guide to Standard American English , 1993 .
[10] David A. Cooper,et al. Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[11] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[12] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[13] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[14] Paul F. Syverson,et al. Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.
[15] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[16] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[17] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[18] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[19] G. Tóth,et al. Measuring Anonymity Revisited , 2004 .