Bernard, Nicolas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Security and Privacy in the Digital Economy: How to Provide Anonymity in Electronic Commerce
Publication date :
2008
Event name :
6th IADIS e-Society International Conference
Event organizer :
IADIS
Event place :
Algarve, Portugal
Event date :
from 09-04-2008 to 12-04-2008
Audience :
International
Main work title :
Proceedings of the 6th IADIS e-Society International Conference (Algarve, April 9-12 2008)
Anderson, R., 2001. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, New York.
Chaum, D., 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, Vol. 24, No. 2, pp. 84-88.
Chaum, D., 1983. Blind signatures for untraceable payments. In Crypto 82, Advances in Cryptology, Plenum, Springer, pp. 199-203.
Chaum, D., 1987. Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Grossen Bruder der Vergangenheit angehören lassen -Zur Diskussion gestellt. In Informatik-Spektrum, Vol. 10, No. 5, pp. 262-277.
Chaum, D., 1992. Achieving electronic privacy. In Scientific American, Vol. 267, No. 2, pp. 96-101.
Christopherson, K.M., 2007. The positive and negative implications of anonymity in Internet social interactions: On the Internet, nobody knows you're a dog. In Computers in Human Behaviour, Vol. 23, No. 6, pp. 3038-3056.
Clarke, I. et al., 2000. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pp. 46-66.
Dagorn, N. and Bernard, N., 2006. Security and Privacy in the Digital Economy: the Case of Electronic Commerce. Proceedings of the 4th IADIS International Conference on e-Society (e-Society 2006), Dublin, Ireland.
Digicash, 1994. Digicash - numbers that are money. Brochure.
Deswarte, Y. and Mé, L., 2002. Sécurité des réseaux et systèmes répartis. Lavoisier, Paris.
Dingledine, R. et al., 2004. Tor: The second-generation onion router. Proceedings of the 13th USENIX Security Symposium.
Hughes, D. and Shmatikov, V., 2004. Information Hiding, Anonymity and Privacy: A Modular Approach. In Journal of Computer Security, Vol. 12, No. 1, pp. 3-36.
Levchin, M., 2007. Founders at Work - Stories of Startups' early days. In Livingstone J. et al. Apress
Marx, G.T., 1999. What's in a Name ? Some Reflections on the Sociology of Anonymity? In The Information Society, Vol. 15, No. 2, pp. 99-112.
Mé, L. and Chaillat, R. 1998. Le commerce électronique: un état de l'art. In Annales des télécommunications, Vol. 53, No. 9-10, pp. 361-376.
Pfitzmann, A. and Hansen, M., 2006. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, v0.28, http://dud.inf.tudresden.de/Anon-Terminology.shtml.
Roualland, G. and Saffroy, J.M., 2001. Ip personality, http://ippersonality.sourceforge.net/.
Reed, M.G. et al., 1998. Anonymous connections and onion routing. In IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 482-494.
Zalewski, M., 2005. Silence on the Wire: a Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press.