Difference between revisions of "References"

From privacy
Jump to navigation Jump to search
(Created page with '== Books == == Papers ==')
 
Line 1: Line 1:
 
== Books ==
 
== Books ==
  
== Papers ==
+
D. Solove "Understanding Privacy"
 +
 
 +
 
 +
== Legal Papers ==
 +
 
 +
C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968). <br>
 +
 
 +
Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890. <br>
 +
 
 +
Dan Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). <br>
 +
 
 +
== Technical papers ==
 +
 
 +
=== Basic techniques ===
 +
 
 +
David Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 4(2): 84-88 (1981).
 +
 
 +
David Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10): 1030-1044 (1985).<br>
 +
 
 +
Ian Goldberg, David Wagner, and Eric Brewer: Privacy-enhancing Technologies for the Internet. Proc. 42nd IEEE Spring COMPCON (1997).<br>
 +
 
 +
Ian Goldberg: Privacy-enhancing technologies for the Internet, II: Five years later. Proc. Privacy Enhancing Technologies workshop (PET 2002).<br>
 +
 
 +
=== Mixnets ===
 +
 
 +
Golle, P., Jakobsson, M., Juels, A., and Syverson, P. F. Universal reencryption
 +
for mixnets. In RSA Conf. (San Fransisco, CA, USA, Feb. 23-27
 +
2004), LNCS 2964, pp. 163-178.
 +
 
 +
=== RFID and Pervasive systems ===
 +
 
 +
Garfinkel, S. L., Juels, A., and Pappu, R. RFID privacy: An overview of
 +
problems and proposed solutions. IEEE Security & Privacy (May 2005), 34-43.
 +
 
 +
Juels, A. RFID security and privacy: A research survey. IEEE Journal on
 +
Selected Areas in Communications 24, 2 (2006), 381-394.
 +
 
 +
Sarma, S. E., Weis, S. A., and Engels, D. W. Rfid systems, security & privacy
 +
implications (white paper). Tech. Rep. MIT-AUTOID-WH-014, Auto-ID Center,
 +
MIT, Cambridge, MA, USA, 2002.
 +
 
 +
Gildas Avoine: A bibliography of RFID
 +
 
 +
 
 +
=== Identity management and credential systems ===
 +
 
 +
Camenisch, Lysyanskaya: "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT 2001: 93-118
 +
 
 +
Stefan Brands: "Rethinking Public Key Infrastructures and Digital
 +
Certificates; Building in Privacy", 1st ed. MIT Press, 2000. ISBN
 +
0-262-02491-8.
 +
 
 +
== Reports ==
 +
 
 +
Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007. (local copy)<br>
 +
 
 +
Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)<br>
 +
 
 +
G.W. van Blarkom, drs. J.J. Borking Beveiliging van persoonsgegevens. Achtergrondstudies en Verkenningen 23, Registratiekamer, Den Haag, april 2001.<br>
 +
 
 +
Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.

Revision as of 18:01, 10 January 2011

Books

D. Solove "Understanding Privacy"


Legal Papers

C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968).

Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890.

Dan Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007).

Technical papers

Basic techniques

David Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 4(2): 84-88 (1981).

David Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10): 1030-1044 (1985).

Ian Goldberg, David Wagner, and Eric Brewer: Privacy-enhancing Technologies for the Internet. Proc. 42nd IEEE Spring COMPCON (1997).

Ian Goldberg: Privacy-enhancing technologies for the Internet, II: Five years later. Proc. Privacy Enhancing Technologies workshop (PET 2002).

Mixnets

Golle, P., Jakobsson, M., Juels, A., and Syverson, P. F. Universal reencryption for mixnets. In RSA Conf. (San Fransisco, CA, USA, Feb. 23-27 2004), LNCS 2964, pp. 163-178.

RFID and Pervasive systems

Garfinkel, S. L., Juels, A., and Pappu, R. RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy (May 2005), 34-43.

Juels, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 381-394.

Sarma, S. E., Weis, S. A., and Engels, D. W. Rfid systems, security & privacy implications (white paper). Tech. Rep. MIT-AUTOID-WH-014, Auto-ID Center, MIT, Cambridge, MA, USA, 2002.

Gildas Avoine: A bibliography of RFID


Identity management and credential systems

Camenisch, Lysyanskaya: "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT 2001: 93-118

Stefan Brands: "Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy", 1st ed. MIT Press, 2000. ISBN 0-262-02491-8.

Reports

Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007. (local copy)

Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)

G.W. van Blarkom, drs. J.J. Borking Beveiliging van persoonsgegevens. Achtergrondstudies en Verkenningen 23, Registratiekamer, Den Haag, april 2001.

Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.