Protection of Privacy on the Web
暂无分享,去创建一个
[1] Scott Dick,et al. A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] Alfred Kobsa,et al. Privacy-enhanced personalization , 2006, FLAIRS.
[3] E. Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[4] Fiona Fui-Hoon Nah,et al. Web browsing and spyware intrusion , 2005, CACM.
[5] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[6] Keng Siau,et al. The value of mobile applications: a utility company study , 2005, CACM.
[7] Hailin Wu,et al. Hidden surveillance by Web sites: Web bugs in contemporary use , 2003, CACM.
[8] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[9] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[10] Simson L. Garfinkel,et al. Web Security, Privacy and Commerce , 2001 .
[11] David M. Kristol,et al. HTTP Cookies: Standards, privacy, and politics , 2001, TOIT.
[12] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[13] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[14] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[15] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[16] J. Rubenfeld. The Right of Privacy , 1989 .
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] George W. Burruss,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[19] P. Kozyris. Controlling Electronic Intrusion by Unsolicited Unwanted Bulk Spam: Privacy vs. Freedom of Communication , 2009 .
[20] E. Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[21] Neha Jain,et al. HIPAA's Effect on Web Site Privacy Policies , 2007, IEEE Security & Privacy.
[22] John Linn,et al. Technology and web user data privacy - a survey of risks and countermeasures , 2005, IEEE Security & Privacy.
[23] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[24] Stephen C. Johnson,et al. USENIX Association , 1992 .
[25] International Journal of Digital Crime and Forensics , 2022 .