E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 2004 workshop on Multimedia and security
Managing Multiple and Dependable Identities
IEEE Internet Computing
Usable presentation of secure pseudonyms
Proceedings of the 2005 workshop on Digital identity management
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Privacy-aware user interfaces within collaborative environments
Proceedings of the international workshop in conjunction with AVI 2006 on Context in advanced interfaces
Proceedings of the second ACM workshop on Digital identity management
Cultural theory: from armchair critic to star performer
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
Linkability estimation between subjects and message contents using formal concepts
Proceedings of the 2007 ACM workshop on Digital identity management
International Journal of Information Technology and Management
Privacy preservation services: challenges and solutions
Proceedings of the 2008 ACM symposium on Applied computing
Multilateral Secure Cross-Community Reputation Systems for Internet Communities
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Modelling the impact of virtual identities on communication infrastructures
Proceedings of the 5th ACM workshop on Digital identity management
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
The need for interoperable reputation systems
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Towards a formal framework for distributed identity management
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy with delegation of rights by identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A framework for quantification of linkability within a privacy-enhancing identity management system
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Towards privacy-aware elearning
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Economics of identity management: a supply-side perspective
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Hi-index | 0.00 |