A Projection of the Future Effects of Quantum Computation on Information Privacy
暂无分享,去创建一个
[1] Lynette Kvasny,et al. The Existential Significance of the Digital Divide for America's Historically Underserved Populations , 2008 .
[2] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[3] Silvana Faja,et al. PRIVACY IN E-COMMERCE: UNDERSTANDING USER TRADE-OFFS , 2005 .
[4] Egon Schwelb. Privacy and Human Rights. , 1974, American Journal of International Law.
[5] Johnny Hartz Søraker. The moral status of information and information technologies: a relational theory of moral status , 2007 .
[6] Lan Anh Tran,et al. Securing Web Services: Practical Usage of Standards and Specifications , 2008 .
[7] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[8] Robert M. Davison,et al. Information Privacy in a Globally Networked Society: Implications for IS Research , 2003, Commun. Assoc. Inf. Syst..
[9] P. Orondo. An Alternative Model of Information Security Investment , 2009 .
[10] Raj Sharman,et al. Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .
[11] S. Wehner. Quantum Computation and Privacy , 2004 .
[12] Elizabeth Chang,et al. A conceptual framework for information privacy and security in collaborative environments , 2006 .
[13] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[14] Robert Hauptman. Encyclopedia of Information Ethics and Security , 2007, Encyclopedia of Information Ethics and Security.
[15] E. Chang,et al. PP-SDLC The privacy protecting systems development life cycle , 2005 .
[16] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[17] Dawn N. Jutla,et al. Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[18] V. R. Christie,et al. Metrics Based Security Assessment , 2004 .
[19] Ian Goldberg,et al. Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.
[20] J. Michael,et al. Privacy and human rights , 1994 .
[21] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[22] Matthias Christandl,et al. Quantum Anonymous Transmissions , 2004, ASIACRYPT.
[23] Dimitris Gritzalis,et al. Embedding privacy in IT applications development , 2004, Inf. Manag. Comput. Secur..