Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Networks without user observability
Computers and Security
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Value exchange systems enabling security and unobservability
Computers and Security
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Properties of protection goals and their integration into a user interface
Computer Networks: The International Journal of Computer and Telecommunications Networking - electronic commerce
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A Java-Based Distributed Platform for Multilateral Security
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Real-time mixes: a bandwidth-efficient anonymity protocol
IEEE Journal on Selected Areas in Communications
Towards privacy-aware elearning
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
First, multilateral security and its potential are introduced. Then protection goals as well as their synergies and interferences are described. After pointing out some basic facts about security technology in general, a structured overviewo f technologies for multilateral security is given. An evaluation of the maturity and effectiveness of these technologies shows that some should be applied immediately, while others need quite a bit of further research and development. Finally, a vision for the future is given.