1 |
D. Farber and K. C. Larson, 'Network Security via Dynamic Process Renaming,' Proc. The 4th Data Communication Symposion, Quebec Canada, Oct., 1975
|
2 |
M. Reichenbach, H. Damker, H. Federrath and K. Rannenberg, 'Individual Management of Personal Reachability in Mobile Communication,' Proc. of the IFIP TC11 SEC 97, 13th International Information Security Conference, pp. 14-16, 1997
|
3 |
D. Chaum, 'Untraceable Electronic Mail, Return Address and Digital Pseudonyms,' Communications of the ACM, Vol. 24, No. 2, pp. 65-75, 1981
|
4 |
ETSI, GSM Recommendations : GSM 01.02-12.21, Feb., 1993
|
5 |
D. Kesdogan, P. Reichl and K. Junghartchen, 'Distributed Temporary Pseudonyms : A New Approach for Protecting Location Information in Mobile Communication Networks,' ESOROCS'98, LNCS Vol. 1485, pp. 295-312, 1998
DOI
ScienceOn
|
6 |
H. Federrath, A. Jerichow, D. Kesdogan and A. Pfitzmann, 'Security in Public Mobile Communication Networks,' Proc. IFIP/TC6 Personal Wireless Communications, Prague, pp. 105-116, 1995
|
7 |
D. Kesdogan, H. Federrath, A. Jerocow and A. Pfitzmann, 'Location Management Strategies increasing Privacy in Mobile Communication Systems,' Proc. The 12th IFIP International Information Security Conference SEC96, Chapman & Hall, 1996
|