Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
References
[1] ISO: Information technology – Security techniques – Hash-functions – Part 3: Dedicated hash-functions, 2004. ISO Standard ISO/IEC 10118-3:2004.
[2] Website of the GNUnet project. September 2007. http://www.gnunet .org/.
[3] Krista Bennett and Christian Grothoff. GAP - practical anonymous networking. In Proceedings of the Workshop on Privacy Enhancing Technologies 2003, LNCS 2760, pages 141–160. Springer, Berlin, 2003.
[4] Christian Grothoff, Ioana Patrascu, Krista Bennett Tiberiu Stef, and Tzvetan Horozov. GNET, Whitepaper, June 2002. Version 0.5.2, http://www.gnunet.org/download/ main.pdf
9 / 11 |