共 22 条
[1]
Art. 29 Working Party, Working document 1/2008 on the protection of children's personal data (General guidelines and the special case of schools), 00483/08/EN, WP 147, (2008)
[2]
D3.1: structured overview on prototypes and concepts of identity management systems, Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society, (2005)
[3]
Borcea-Pfitzmann K., Hansen M., Liesebach K., Pfitzmann A., Steinbrecher S., What user-controlled identity management should learn from communities, Information security technical report, 11, (2006)
[4]
Buchmann J., May A., Vollmer U., Perspectives for cryptographic long-term security, Communications of the ACM, 49, (2006)
[5]
Camenisch J., Lysyanskaya A., Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Research report RZ 3295 (# 93341), (2000)
[6]
Casassa Mont M., Pearson S., Bramhall P., Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, HPL-2003-49, (2003)
[7]
Chaum D., Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 24, (1981)
[8]
Chaum D., Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, 28, (1985)
[9]
Chaum D., van Heyst E., Group signatures, Advances in cryptology - EUROCRYPT '91, 547, (1991)
[10]
Chor B., Kushilevitz E., Goldreich O., Sudan M., Private information retrieval, Journal of the ACM, 45, 6, pp. 965-981, (1998)