Goals of the NymIP Effort [online] Available: http://nymip.velvet.com/cvs/general/goals.html [Mar. 14, 2001]. |
Thy NymIP Effort [online] Available: http://nymip.velvet.com/ [Mar. 14, 2001]. |
Principles For Standardization and Interoperability in Web-based Digital Rights Management [online] Available: http://www.w3.org/2000/12/drm-ws/pp/hp-erickson.html [Mar. 13, 2001]. |
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms [online] Available: http:world.std.com/ franl/crypto/chaum-acr-1981.html [Mar. 13, 2001]. |
Intel Nixes Chip-Tracking ID [online] Available: http://www.wired.com/news/politics/0,1283,35950,00.html [Mar. 13, 2001]. |
SafeNet 2000: Security and Privacy Leaders Gather at Microsoft Campus to Seek Solutions To Chanllenges Facing Internet USers [online] Available: http://www.microsoft.com/PressPass/features/2000/dec00/12-07safenet.asp [Mar. 13, 2001]. |
RealNetworks in Real Trouble [online] Available: http://www.wirednews.com/news/politics/0,1283,32459,00.html [Mar. 13, 2001]. |
David Chaum, “Achieving Electronic Privacy”, Scientific American, Aug. 1992, pp. 96-101. |
Kenneth C. Laudon, “Markets and Privacy”, Communications of the ACM, Sep. 1996/vol. 39, No. 9, pp. 92-104. |
Julie E. Chohen, “A Right To Read Anonymously: A Closer Look At “Copyright Management” In Cyberspace”, Originally published 28, Conn. L. Rev. 981 (1996). |
Nabil R. Adam and John C. Wortmann, “Security-Control Methods For Statistical Databases: A Comparative Study”, ACM Computing Surveys, vol. 21, No. 4, Dec. 1989, pp. 515-556. |
Jan Schlorer, “Security of Statistical Databases: Multidimensional Transformaion”, ACM Transactions on Database Systems, vol. 6, No. 1, Mar. 1981, pp 95-112. |
George T. Duncan and Sumitra Mukherjee, “Optimal Disclosure Limitation Strategy In Statistical Databases: Deterring Tracker Attacks Through Addititive Noise”, Jun. 16, 1998, [Online] Available: http://duncan.heinz.cmu.edu/GeorgeWeb. |