Author:
Borcea-Pfitzmann Katrin,Hansen Marit,Liesebach Katja,Pfitzmann Andreas,Steinbrecher Sandra
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference11 articles.
1. D3.1: structured overview on prototypes and concepts of identity management systems,2005
2. Borcea K, Donker H, Franz E, Liesebach K, Pfitzmann A, Wahrig H. Intra-application partitioning of personal data. In: Proceedings of workshop on privacy-enhanced personalization (PEP 2005), Edinburgh, UK; 2005, http://www.isr.uci.edu/pep05/papers/borcea-pep.pdf [current May 2006].
3. Security without identification: transaction systems to make big brother obsolete;Chaum;Communications of the ACM,1985
4. Dourish P, Bly S. Portholes: supporting awareness in a distributed work group. In: Proceedings of ACM CHI'92 conference on human factors in computing system, http://www.ics.uci.edu/∼jpd/publications/1992/chi92-portholes.pdf; 1992. p. 541–7 [current May 2006].
5. The social cost of cheap pseudonyms;Friedman;Journal of Economics and Management Strategy,1998
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献