You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.2: Set of use cases and scenarios > 

D2.2: Set of use cases and scenarios

Tradeoffs  Title:
REFERENCES
 Ubiquitous Computing Scenario, Univ. of Reading

 

References

 

[1] http://eid.belgium.be/

[2] Untraceable electronic mail, return addresses, and digital pseudonyms. David Chaum. Communications of the ACM 4(2), February 1981.

[3] ISDN-mixes: Untraceable communication with very small bandwidth overhead. Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Proceedings of the GI/ITG Conference on Communication in Distributed Systems, February 1991, pages 451-463

[4] Web MIXes: A system for anonymous and unobservable Internet access. Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 115-129.

[5] A Pseudonymous Communications Infrastructure for the Internet. Ian Goldberg.Ph.D. thesis, UC Berkeley, December 2000.

[6] Tarzan: A Peer-to-Peer Anonymizing Network Layer. Michael J. Freedman and Robert Morris. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, November 2002.

[7] Design and implementation of the idemix anonymous credential system. J. Camenisch and E. Van Herreweghen.   Proceedings of the 9th ACM conference on Computer and Communications Security, pages 21–30. ACM Press, Nov 2002.

[8] An efficient system for non-transferable anonymous credentials with optional anonymity revocation. Jan Camenisch and Anna Lysyanskaya. EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, pages 93+, 2001. 

[9] Generalising Mixes. Claudia Díaz and Andrei Serjantov. Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003.

[10] Mixminion: Design of a Type III Anonymous Remailer Protocol. George Danezis, Roger Dingledine, and Nick Mathewson. Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003.

[11] Signature Schemes and Anonymous Credentials from Bilinear Maps. Jan Camenisch, Anna Lysyanskaya. Proceedings of CRYPTO 2004, pages 56-72.

[12] Towards measuring anonymity. Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), April 2002.

[13] Towards an Information Theoretic Metric for Anonymity. Andrei Serjantov and George Danezis. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), April 2002.

 

 

Tradeoffs  fidis-wp2-del2.2.Cases_stories_and_Scenario_04.sxw  Ubiquitous Computing Scenario, Univ. of Reading
42 / 69