Privacy Enhanced Technologies: Methods - Markets - Misuse

@inproceedings{Federrath2005PrivacyET,
  title={Privacy Enhanced Technologies: Methods - Markets - Misuse},
  author={Hannes Federrath},
  booktitle={TrustBus},
  year={2005}
}
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it profitable. The governments or non-profit organisations must therefore run such systems or at least… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

Enhancing Trust on e-Government: A Decision Fusion Module

2009 Third International Conference on Network and System Security • 2009
View 5 Excerpts
Highly Influenced

The k-unobservability: A new privacy protection guarantee for e-service systems

2014 Information and Communication Technologies Innovation and Application (ICTIA) • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 21 references

Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms

Secure Electronic Voting • 2003
View 6 Excerpts
Highly Influenced

Mixmaster & Remailer Attacks (1995) http://www.obscura.com/ ~loki/remailer-essay.html

L. Cottrell
1995
View 5 Excerpts
Highly Influenced

Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology

Workshop on Design Issues in Anonymity and Unobservability • 2000
View 1 Excerpt

Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems

Workshop on Design Issues in Anonymity and Unobservability • 2000
View 1 Excerpt

Crowds: Anonymity for Web Transactions

ACM Trans. Inf. Syst. Secur. • 1998
View 1 Excerpt

Similar Papers

Loading similar papers…