Anonymity , Unobservability , Pseudonymity , and Identity Management – A Proposal for Terminology
暂无分享,去创建一个
[1] Paul F. Syverson,et al. Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.
[2] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[3] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[4] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[5] David A. Cooper,et al. Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[6] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[7] Andreas Pfitzmann,et al. Value exchange systems enabling security and unobservability , 1990, Comput. Secur..
[8] David Chaum,et al. Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.
[9] Michael Waidner,et al. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.
[10] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[11] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[12] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[13] Robert Liebendorfer. Mind, self and society , 1960 .