Author:
Wästlund Erik,Angulo Julio,Fischer-Hübner Simone
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Brands, S.: Rethinking Public Key Infrastructure and Digital certificates - Building in Privacy. Ph.D. thesis, Eindhoven. Institute of Technology (1999)
2. Lecture Notes in Computer Science;J. Camenisch,2001
3. Camenisch, J., Crane, S., Fischer-Hübner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D., Andersson, C.: Trust in PRIME. In: Proceedings of Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 552–559 (December 2005)
4. Camenisch, J., Shelat, A., Sommer, D., Zimmermann, R.: Securing user inputs for the web. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006, pp. 33–44. ACM, New York (2006)
5. Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Challenges of Usable Privacy;Synthesis Lectures on Information Security, Privacy, and Trust;2024
2. A Decade of Development of Mental Models in Cybersecurity and Lessons for the Future;Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media;2023
3. Achieving Usable Security and Privacy Through Human-Centered Design;Human Factors in Privacy Research;2023
4. Exploring mental models of the right to informational self-determination of office workers in Germany;Proceedings on Privacy Enhancing Technologies;2021-04-27
5. HCI Patterns for Cryptographically Equipped Cloud Services;Human-Computer Interaction. Theories, Methods, and Human Issues;2018