Schutz der Anonymität als Gemeinschaftsaufgabe - eine neue Generation von PETs?
暂无分享,去创建一个
William J. Buchanan | Burkhard Schafer | Judith Rauhofer | Zbigniew Kwecka | Judith Rauhofer | Zbigniew Kwecka | William J. Buchanan | B. Schafer
[1] William J Buchanan,et al. Privacy-preserving data acquisition protocol , 2010, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON).
[2] Charles D. Raab. Privacy, Social Values and the Public Interest , 2012 .
[3] Rafail Ostrovsky,et al. A Survey of Single Database PIR: Techniques and Applications , 2007, IACR Cryptol. ePrint Arch..
[4] Robert H. Deng,et al. Privacy Protection for Transactions of Digital Goods , 2001, ICICS.
[5] P E Fine,et al. Herd immunity: history, theory, practice. , 1993, Epidemiologic reviews.
[6] Adi Shamir,et al. On the Power of Commutativity in Cryptography , 1980, ICALP.
[7] Spiros Simitis,et al. Reviewing Privacy In an Information Society , 1987 .
[8] Yehuda Lindell,et al. Secure Computation without Agreement , 2002, DISC.
[9] Mikhail J. Atallah,et al. Privacy preserving electronic surveillance , 2003, WPES '03.
[10] M. Weitzman. The Share Economy , 1984 .
[11] Shweta Bansal,et al. Network frailty and the geometry of herd immunity , 2006, Proceedings of the Royal Society B: Biological Sciences.
[12] Peter Swire,et al. Security and privacy after September 11: the health care example , 2002, CFP '02.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[15] Edward J. Bloustein,et al. Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser , 1984 .
[16] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[17] Young B. Choi,et al. Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules , 2006, Journal of Medical Systems.
[18] Stephen A. Weis. New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .
[19] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[20] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[21] Priscilla M. Regan. Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.
[22] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[23] William J Buchanan,et al. Validation of 1-N OT algorithms in privacy-preserving investigations. , 2008 .
[24] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .