共 34 条
[1]
Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review
[J].
DESIGN, USER EXPERIENCE, AND USABILITY: THEORY AND PRACTICE, DUXU 2018, PT I,
2018, 10918
:608-627
[2]
Efficient metadata management in large distributed storage systems
[J].
20TH IEEE/11TH NASA GODDARD CONFERENCE ON MASS STORAGE AND TECHNOLOGIES (MSST 2003), PROCEEDINGS,
2003,
:290-298
[3]
Bruegger Bud P, 2016, Towards a decentralized identity management ecosystem for Europe and beyond
[4]
Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
[5]
A Critical Analysis of Privacy Design Strategies
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016),
2016,
:33-40
[6]
Damiani Maria Luisa., 2013, European Data Protection: Coming of Age, chapter Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends, P223
[7]
Mixminion: Design of a type III anonymous remailer protocol
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:2-15
[9]
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
[10]
Fan Lu, 2012, eTELEMED, V2012, P99