Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Blarkom G, Borking J, Verhaar P (2003) The case of intelligent software agents. In: Handbook of privacy and privacy-enhancing technologies. The Hague, pp 33–54. https://www.andrewpatrick.ca/pisa/handbook/Handbook_Privacy_and_PET_final.pdf
2. Cavoukian A (2011) Privacy by design – the 7 foundational principles. Revised version. https://www.
ipc.on.ca/wp-content/uploads/resources/7foundational
principles.pdf
3. Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88
4. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of 13th Conference on USENIX Security Symposium (SSYM’04), vol 13, Aug 2004. https://dl.acm.org/doi/10.5555/1251375.1251396
5. Federrath H (2005) Privacy enhanced technologies: methods – markets – misuse. In: Proceedings of 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus’05). LNCS 3592, Springer, pp 1–9