Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Networks without user observability
Computers and Security
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Value exchange systems enabling security and unobservability
Computers and Security
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Properties of protection goals and their integration into a user interface
Computer Networks: The International Journal of Computer and Telecommunications Networking - electronic commerce
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A Java-Based Distributed Platform for Multilateral Security
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Real-time mixes: a bandwidth-efficient anonymity protocol
IEEE Journal on Selected Areas in Communications
Combining Biometric Authentication with Privacy-Enhancing Technologies
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Hi-index | 0.00 |
First, multilateral security and its potential are introduced. Then protection goals as well as their synergies and interferences are described. After pointing out some basic facts about security technology in general, a structured overview of technologies for multilateral security is given. An evaluation of the maturity and effectiveness of these technologies shows that some should be applied immediately, while others need quite a bit of further research and development. Finally, a vision for the future is given.