- 1.W. C. Hill, L. Stead, M. Rosenstein and G. Furnas, "Recommending and evaluating choices in a virtual community of use", proc. CHI'95, (1995), 194-201. Google ScholarDigital Library
- 2.C. Avery and R. Zeckhauser, "Recommender systems for evaluating computer messages". Communications of the A CM 40, (1997), 88-89. Google ScholarDigital Library
- 3.N. Glance, D. Arregui, and M. Dardenne, "Knowledge pump: supporting the flow and use of knowledge", in Information Technology for Knowledge Management. Eds. U. Borghoff and R. Pareschi, Springer (1998).Google Scholar
- 4.B. A. Huberman and T. Hogg, "Communities of practice: performance and evolution'', Computational and Mathematical Organization Theory 1, (1995), 73-92. Google ScholarDigital Library
- 5.P. Samuelson, "Liability for Defective Electronic Information", Communications of the ACM 36, (1993), 21-26. Google ScholarDigital Library
- 6.M. Bellare and S. Micali, "Non-interactive oblivious transfer and applications", proc. Crypto '89, 547-557. Google ScholarDigital Library
- 7.S. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks", proc. IEEE Symposium on Security and Privacy (Oakland 1992), 72-84. Google ScholarDigital Library
- 8.J. Camenisch and M. Stadler, "Efficient group signatures schemes for large groups", proc. Crypto '97, 410-424. Google ScholarDigital Library
- 9.R. Cramer, I. Damgaard and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols'', proc. Crypto '94, 174-187. Google ScholarDigital Library
- 10.W. Difiie and M. Hellman, "New directions in cryptography", IEEE Transaction on Information Theory 22 (1976), 644- 654.Google ScholarDigital Library
- 11.M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications", proc. Eurocrypt '96, 143- 154. Google ScholarDigital Library
- 12.T. E1Gamal, "A public key cryptosystsem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory 31 (1985), 469-472.Google ScholarCross Ref
- 13.R. Fagin, M. Naor, and P. Winkler, "Comparing information without leaking it", Communications of the ACM 39 (1996), 77-85. Google ScholarDigital Library
- 14.U. Feige, A. Fiat and A. Shamir, "Zeroknowledge proofs of identity", Journal of Cryptology I (1988), 77-94. Google ScholarDigital Library
- 15.S. Goldwasser and S. Micali, "Probabilistic public key encryption" Journal of Computer and System Sciences 28 (1984), 270-299.Google ScholarCross Ref
- 16.J. Kilian and E. Petrank, "Identity Escrow'', proc Crypto '98, 169-185. Google ScholarDigital Library
- 17.M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation", proc. ACM STOC, 1999, 245-254. Google ScholarDigital Library
- 18.C. Schnorr, "Efficient signature generation by smart cards", Journal of Cryptology 4 (1991), 161-174.Google ScholarDigital Library
- 19.F. Fukuyama, "Trust: the social virtues and the creation of prosperity", Free Press (~996).Google Scholar
- 20.The New York Times, April 8, 1999.Google Scholar
- 21.A. Zahavi and A. Zahavi, "The Handicap Principle: A Missing Piece of Darwin's Puzzle", Oxford Univ. Press (1997).Google Scholar
- 22.D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash", proc. Crypto '88, 319-327. Google ScholarDigital Library
Index Terms
- Enhancing privacy and trust in electronic communities
Recommendations
How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor
Due to an increasing collection of personal data by internet companies and several data breaches, research related to privacy gained importance in the last years in the information systems domain. Privacy concerns can strongly influence users' decision ...
An efficient privacy mechanism for electronic health records
Electronic health records (EHRs), digitization of patients' health record, offer many advantages over traditional ways of keeping patients' records, such as easing data management and facilitating quick access and real-time treatment. EHRs are a rich ...
Privacy-enhancing technologies: approaches and development
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection ...
Comments