Жорсткі технології приватності (Ukrainian Wikipedia)

Analysis of information sources in references of the Wikipedia article "Жорсткі технології приватності" in Ukrainian language version.

refsWebsite
Global rank Ukrainian rank
2nd place
4th place
120th place
208th place
1st place
1st place
69th place
188th place
11th place
964th place
low place
low place
6th place
6th place
18th place
74th place
low place
low place
1,060th place
1,757th place
1,182nd place
7,843rd place

archive.org

arxiv.org

doi.org

  • Trepte, Sabine & Reinecke, Leonard. (2001). Trepte, Sabine; Reinecke, Leonard (ред.). Privacy Online. Т. 10.1007/978-3-642-21521-6. doi:10.1007/978-3-642-21521-6. ISBN 978-3-642-21520-9.
  • Bernhard, Matthew & Benaloh, Josh & Halderman, J. & Rivest, Ronald & Ryan, Peter & Stark, Philip & Teague, Vanessa & Vora (2017). Public Evidence from Secret Ballots. Electronic Voting. Lecture Notes in Computer Science. Т. 84-109. 10.1007/978-3-319-68687-5_6. с. 84—109. arXiv:1707.08619. doi:10.1007/978-3-319-68687-5_6. ISBN 978-3-319-68686-8. S2CID 34871552.
  • Sampigethaya, K.; Poovendran, R. (December 2006). A Survey on Mix Networks and Their Secure Applications (PDF). Proceedings of the IEEE. 94 (12): 2142—2181. doi:10.1109/JPROC.2006.889687. Архів оригіналу (PDF) за 15 квітня 2021. Процитовано 11 березня 2022.
  • Claudio A. Ardagna (2009). Privacy Preservation over Untrusted Mobile Networks. У Bettini, Claudio та ін. (ред.). Privacy In Location-Based Applications: Research Issues and Emerging Trends. Lecture Notes in Computer Science. Springer. с. 88. Bibcode:2009LNCS.5599...84A. doi:10.1007/978-3-642-03511-1_4. ISBN 978-3-642-03511-1.
  • Trepte, Sabine & Teutsch, Doris & Masur, Philipp K. & Eichler, C. & Fischer, Mona & Hennhöfer, Alisa & Lind, Fabienne (2015). Do People Know About Privacy and Data Protection Strategies? Towards the "Online Privacy Literacy Scale". OPLIS. Law, Governance and Technology Series. 10.1007/978-94-017-9385-8. doi:10.1007/978-94-017-9385-8. ISBN 978-94-017-9384-1.
  • Corrales, Marcelo & Jurcys, Paulius & Kousiouris, George (2018). Smart Contracts and Smart Disclosure: Coding a GDPR Compliance Framework. SSRN Electronic Journal. 10.2139/ssrn.3121658. doi:10.2139/ssrn.3121658.
  • Robles-González, Antonio, Parra-Arnau, Javier b, Forné, Jordi a (2020). A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes. Computers & Security. 94: 101755. doi:10.1016/j.cose.2020.101755.

harvard.edu

ui.adsabs.harvard.edu

onion-router.net

patents.google.com

pcmag.com

researchgate.net

  • Trepte, Sabine & Reinecke, Leonard. (2001). Trepte, Sabine; Reinecke, Leonard (ред.). Privacy Online. Т. 10.1007/978-3-642-21521-6. doi:10.1007/978-3-642-21521-6. ISBN 978-3-642-21520-9.
  • Bernhard, Matthew & Benaloh, Josh & Halderman, J. & Rivest, Ronald & Ryan, Peter & Stark, Philip & Teague, Vanessa & Vora (2017). Public Evidence from Secret Ballots. Electronic Voting. Lecture Notes in Computer Science. Т. 84-109. 10.1007/978-3-319-68687-5_6. с. 84—109. arXiv:1707.08619. doi:10.1007/978-3-319-68687-5_6. ISBN 978-3-319-68686-8. S2CID 34871552.
  • Corrales, Marcelo & Jurcys, Paulius & Kousiouris, George (2018). Smart Contracts and Smart Disclosure: Coding a GDPR Compliance Framework. SSRN Electronic Journal. 10.2139/ssrn.3121658. doi:10.2139/ssrn.3121658.
  • Sion, Laurens & Wuyts, Kim & Yskout, Koen & Landuyt, Dimitri & Joosen, Wouter (2018). Interaction-Based Privacy Threat Elicitation. EuroSPW. 79-86. 10.1109.

semanticscholar.org

api.semanticscholar.org

uw.edu

labs.ece.uw.edu

web.archive.org