Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Networks without user observability
Computers and Security
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Unconditional sender and recipient untraceability in spite of active attacks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals
Proceedings of the First International Workshop on Information Hiding
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms
Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
Proceedings of the second ACM workshop on Digital identity management
Measuring relationship anonymity in mix networks
Proceedings of the 5th ACM workshop on Privacy in electronic society
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Anonymity analysis in credentials-based systems: A formal framework
Computer Standards & Interfaces
Slotted packet counting attacks on anonymity protocols
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
A-HIP: a solution offering secure and anonymous communications in MANETs
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Efficient computationally private information retrieval from anonymity or trapdoor groups
ISC'10 Proceedings of the 13th international conference on Information security
Relations among privacy notions
ACM Transactions on Information and System Security (TISSEC)
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Transactions on Data Privacy
RAD: Recipient-anonymous data delivery based on public routing proxies
Computer Networks: The International Journal of Computer and Telecommunications Networking
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Preserving software quality characteristics from requirements analysis to architectural design
EWSA'06 Proceedings of the Third European conference on Software Architecture
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A framework for quantification of linkability within a privacy-enhancing identity management system
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Reasoning about the anonymity provided by pool mixes that generate dummy traffic
IH'04 Proceedings of the 6th international conference on Information Hiding
Non-expanding transaction specific pseudonymization for IP traffic monitoring
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Limits to anonymity when using credentials
SP'04 Proceedings of the 12th international conference on Security Protocols
A privacy-aware service protocol for ubiquitous computing environments
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
FLASCHE – a mechanism providing anonymity for mobile users
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Protecting anonymity in wireless medical monitoring environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Share the secret: enabling location privacy in ubiquitous environments
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
Unique user-generated digital pseudonyms
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Local view attack on anonymous communication
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
BSCA-P: privacy preserving coalition formation
MATES'05 Proceedings of the Third German conference on Multiagent System Technologies
TrustedPals: secure multiparty computation implemented with smart cards
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Optimal key-trees for tree-based private authentication
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Anonymity and security in mobile ad hoc networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Probabilistic analysis of onion routing in a black-box model
ACM Transactions on Information and System Security (TISSEC)
Improving content availability in the i2p anonymous file-sharing environment
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Privacy Challenges in the Use of eHealth Systems for Public Health Management
International Journal of E-Health and Medical Communications
Mechanism for Privacy Preservation in VANETS
International Journal of Grid and High Performance Computing
The dangers of composing anonymous channels
IH'12 Proceedings of the 14th international conference on Information Hiding
Improved anonymity for key-trees
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Why do people seek anonymity on the internet?: informing policy and design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
POSTER: On the anonymity of Israel's general elections
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the limits of provable anonymity
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Journal of Network and Computer Applications
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
Based on the nomenclature of the early papers in the field, we propose a set of terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes). We hope that the adoption of this terminology might help to achieve better progress in the field by avoiding that each researcher invents a language of his/her own from scratch. Of course, each paper will need additional vocabulary, which might be added consistently to the terms defined here.