暂无分享,去创建一个
Kai Rannenberg | Hannes Federrath | Stefan Köpsell | Dogan Kesdogan | Sebastian Pape | Christian Roth | Dominik Herrmann | David Harborth
[1] Ian Goldberg,et al. PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks , 2013, CCS.
[2] Renato Lo Cigno,et al. IPsec-Based Anonymous Networking: A Working Implementation , 2009, 2009 IEEE International Conference on Communications.
[3] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[4] B. Wirtz. Business Model Management , 2011 .
[5] Reza Shokri,et al. On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.
[6] Hannes Federrath,et al. EncDNS: A Lightweight Privacy-Preserving Name Resolution Service , 2014, ESORICS.
[7] Dirk Schneckenberg,et al. Business Model Innovation – State of the Art and Future Challenges for the Field , 2014 .
[8] Hans Hedbom. Towards an Economic Valuation of Identity Management Enablers , 2013 .
[9] Yves Pigneur,et al. Business Model Generation: A handbook for visionaries, game changers and challengers , 2010 .
[10] Dogan Kesdogan,et al. A Practical Complexity-Theoretic Analysis of Mix Systems , 2011, ESORICS.
[11] Kai Rannenberg,et al. Privacy by Sustainable Identity Management Enablers , 2011, Privacy and Identity Management for Life.
[12] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[13] Hannes Federrath,et al. Introducing the gMix Open Source Framework for Mix Implementations , 2012, ESORICS.
[14] Hannes Federrath,et al. IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy , 2012, ArXiv.
[15] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[16] Hannes Federrath. Sicherheit mobiler Kommunikation - Schutz in GSM-Netzen, Mobilitätsmanagement und mehrseitige Sicherheit , 1999, DuD-Fachbeiträge.
[17] Roger Dingledine,et al. Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .
[18] Ian Goldberg,et al. Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.
[19] Dogan Kesdogan,et al. Privacy in E-Commerce , 2001 .
[20] Nora Cuppens-Boulahia,et al. IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices , 2013, EUNICE.
[21] Steffen Kunz,et al. Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network , 2012, Future Internet.
[22] Thijs Veugen,et al. Transparency Enhancing Tools (TETs): An Overview , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.
[23] Gregory Neven,et al. Economic Valuation of Identity Management Enablers , 2013 .
[24] Birgit Pfitzmann,et al. A Toolkit for Managing Enterprise Privacy Policies , 2003, ESORICS.
[25] G. Sampson. Electronic Business , 2008 .