Documents Related by Co-Citation

887 k-anonymity: a model for protecting privacy – L Sweeney
398 Anonymous usage of location-based services through spatial and temporal cloaking – Marco Gruteser, Dirk Grunwald - 2003
463 Blind signatures for untraceable payments – D Chaum - 1983
860 Tor: The Second-Generation Onion Router – Roger Dingledine, Nick Mathewson, Paul Syverson - 2004
596 Protocols for secure computations – A Yao - 1982
705 Public-key cryptosystems based on composite degree residuosity classes – Pascal Paillier - 1999
484 ℓ-diversity: Privacy beyond k-anonymity – Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam - 2006
1246 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
1305 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum - 1981