A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms (English)
- New search for: Jorns, Oliver
- New search for: Jung, Oliver
- New search for: Gross, Julia
- New search for: Bessler, Sandford
- New search for: Jorns, Oliver
- New search for: Jung, Oliver
- New search for: Gross, Julia
- New search for: Bessler, Sandford
In:
Trust, Privacy, and Security in Digital Business
3
;
100-109
;
2005
- Article/Chapter (Book) / Electronic Resource
-
Title:A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
-
Contributors:Jorns, Oliver ( author ) / Jung, Oliver ( author ) / Gross, Julia ( author ) / Bessler, Sandford ( author )
-
Published in:Trust, Privacy, and Security in Digital Business , 3 ; 100-109Lecture Notes in Computer Science ; 3592, 3 ; 100-109
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2005-01-01
-
Size:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Privacy Enhanced Technologies: Methods – Markets – MisuseFederrath, Hannes et al. | 2005
- 10
-
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous DomainsBelsis, Petros / Gritzalis, Stefanos / Malatras, Apostolos / Skourlas, Christos / Chalaris, Ioannis et al. | 2005
- 20
-
Protection Mechanisms Against Phishing AttacksPlössl, Klaus / Federrath, Hannes / Nowey, Thomas et al. | 2005
- 30
-
Dropout-Tolerant TTP-Free Mental PokerCastellà-Roca, Jordi / Sebé, Francesc / Domingo-Ferrer, Josep et al. | 2005
- 41
-
A Self-healing Mechanism for an Intrusion Tolerance SystemPark, Bumjoo / Park, Kiejin / Kim, Sungsoo et al. | 2005
- 50
-
Protecting Online Rating Systems from Unfair RatingsWeng, Jianshu / Miao, Chunyan / Goh, Angela et al. | 2005
- 60
-
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTPPayeras-Capellà, M. Magdalena / Ferrer-Gomila, Josep Lluís / Huguet-Rotger, Llorenç et al. | 2005
- 70
-
Designing Secure E-Tendering SystemsDu, Rong / Foo, Ernest / Nieto, Juan González / Boyd, Colin et al. | 2005
- 80
-
A Multilateral Secure Payment System for Wireless LAN HotspotsGroß, Stephan / Lein, Sabine / Steinbrecher, Sandra et al. | 2005
- 90
-
Secure Group Communications over Combined Wired and Wireless NetworksNam, Junghyun / Kim, Seungjoo / Won, Dongho et al. | 2005
- 100
-
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction PseudonymsJorns, Oliver / Jung, Oliver / Gross, Julia / Bessler, Sandford et al. | 2005
- 110
-
Making Money with Mobile Qualified Electronic SignaturesRossnagel, Heiko / Royer, Denis et al. | 2005
- 119
-
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)Muñoz, Jose L. / Forné, Jordi / Esparza, Oscar / Rey, Manel et al. | 2005
- 128
-
Secure Index Search for GroupsPark, Hyun-A / Byun, Jin Wook / Lee, Dong Hoon et al. | 2005
- 141
-
Provision of Secure Policy Enforcement Between Small and Medium Governmental OrganizationsOikonomidis, Nikolaos / Tcaciuc, Sergiu / Ruland, Christoph et al. | 2005
- 151
-
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced SecurityLin, Ching / Varadharajan, Vijay / Wang, Yan et al. | 2005
- 161
-
The Fuzzy and Dynamic Nature of TrustChang, Elizabeth / Thomson, Patricia / Dillon, Tharam / Hussain, Farookh et al. | 2005
- 175
-
Towards an Ontology of TrustViljanen, Lea et al. | 2005
- 185
-
An Improved Group Signature SchemeZhang, Jianhong / Zou, Jiancheng / Wang, Yumin et al. | 2005
- 195
-
Efficient Member Revocation in Group Signature SchemesChoi, Eun Young / Kim, Hyun-Jeong / Lee, Dong Hoon et al. | 2005
- 206
-
Conditional Digital SignaturesKlonowski, Marek / Kutyłowski, Mirosław / Lauks, Anna / Zagórski, Filip et al. | 2005
- 216
-
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic TransactionsSeo, Seung-Hyun / Shim, Kyung-Ah / Lee, Sang-Ho et al. | 2005
- 226
-
Privacy Enforcement for IT Governance in Enterprises: Doing It for RealMont, Marco Casassa / Thyne, Robert / Bramhall, Pete et al. | 2005
- 236
-
An Adaptive Privacy Management System for Data RepositoriesMont, Marco Casassa / Pearson, Siani et al. | 2005
- 246
-
Privacy Preserving Data Mining Services on the WebHintoğlu, Ayça Azgın / Saygın, Yücel / Benbernou, Salima / Hacid, Mohand Said et al. | 2005
- 256
-
Reading Your Keystroke: Whose Mail Is It?Kierkegaard, Sylvia Mercado et al. | 2005
- 266
-
A Novel Construction of Two-Party Private Bidding Protocols from Yao’s Millionaires ProblemZhu, Huafei / Bao, Feng et al. | 2005
- 274
-
An Improved Double Auction Protocol Against False BidsHa, JungHoon / Zhou, Jianying / Moon, SangJae et al. | 2005
- 288
-
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-AuctionsBewsell, Glenn / Jamieson, Rodger / Gardiner, Adrian / Bunker, Deborah et al. | 2005
- 299
-
A Secure Fingerprint Authentication System on an Untrusted Computing EnvironmentChung, Yongwha / Moon, Daesung / Kim, Taehae / Pan, SungBum et al. | 2005
- 311
-
Security Enhancement for Password Authentication Schemes with Smart CardsYoon, Eun-Jun / Kim, Woo-Hun / Yoo, Kee-Young et al. | 2005
- 321
-
Securing Operating System Services Based on Smart CardsCatuogno, Luigi / Gassirà, Roberto / Masullo, Michele / Visconti, Ivan et al. | 2005