1 |
A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMIXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
|
2 |
D. Kesdogan, H. Federrath, A. Jericow, and A. Pfizmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' 12th IFIP International Conference on Informatin Security (IFIP/SEC'96), 1996
|
3 |
D. J. Farber and K. C. Larson, 'Network Security Via Dynamic Process Renaming,' Proc. of Fourth Data Communications Symposium, pp. 8-18, 1975
|
4 |
D. Kesdogan, P. Reichl, and K. Junghartchen, 'Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS '98, LNCS vol. 1485, pp. 295-312, 1998
|
5 |
H. Federrath, A. Jericow, and A. Pfitzmann, 'MIXes in Mobile Communication Systems: Location Management with Privacy:' Proc. of the Workshop on Information Hiding, 1997
|
6 |
A. Pfitzmann, B. Pfitzmann, and M. Waidner, 'ISDNMiXes Untraceable Communication with Very Small Bandwidth Overhead,' 7th IFIP International Conference on Informatin Security(IFIP/SEC'91), 1991
|
7 |
V. Benjumea, J. Lopez, J. A. Montenegro, and J. M. Troya, 'A First Approach to Provide Anonymity in Attribute Certificates,' Proc. of the PKC2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS vol. 2047, pp. 12-28,2004
|
8 |
ETSI, 'GSM Recommendations: GSM 01.02-12.21,' Feb 1993, Release 1992
|
9 |
S. S. Kim, S. S. Yeo, H. J. Park, and S. K. Kim, 'A New Scheme for the Location Information Protection in Mobile Communication Environments,' MMM-ACNS '2005, LNCS vol. 3685, pp. 436-441, 2005
|
10 |
B. Askwith, M. Merabti, Q. Shi, and K. Whiteley, 'Achieving User Privacy in Mobile Networks,' 13th Annual Computer Security Applications Conference, 1997
|