2002
DOI: 10.1007/3-540-45705-4_33
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2004
2004
2005
2005

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…However, preventing this is out of scope of this work. In order to achieve unlinkability for electronic purchases in general, additional technologies have to be used, e.g., unlinkability of search and order phases proposed in Enzmann et al (2002b), Enzmann et al (2002a), payment systems that allow the customer to remain anonymous with respect to the vendor (Chaum, 1989;Camenisch et al, 1996), anonymity networks as in Chaum (1981), Reed et al (1998), or privacyfriendly delivery in case of hard goods similar to the approach proposed in Enzmann and Eckert (2002).…”
Section: Requirementsmentioning
confidence: 99%
“…However, preventing this is out of scope of this work. In order to achieve unlinkability for electronic purchases in general, additional technologies have to be used, e.g., unlinkability of search and order phases proposed in Enzmann et al (2002b), Enzmann et al (2002a), payment systems that allow the customer to remain anonymous with respect to the vendor (Chaum, 1989;Camenisch et al, 1996), anonymity networks as in Chaum (1981), Reed et al (1998), or privacyfriendly delivery in case of hard goods similar to the approach proposed in Enzmann and Eckert (2002).…”
Section: Requirementsmentioning
confidence: 99%
“…However, preventing this is out of scope of this work. In order to achieve unlinkability for electronic purchases in general, additional technologies have to be used, e.g., unlinkability of search and order phases proposed in [8], payment systems that allow the customer to remain anonymous with respect to the vendor [5,2], anonymity networks as in [3,14], or privacyfriendly delivery in case of hard goods similar to the approach proposed in [7].…”
Section: Privacymentioning
confidence: 99%
“…For instance, in the area of payment systems, the unlinkability of widthdrawal and desposit has been considered [5,2]. In [8], a solution to establish the unlinkability of the customer's search and order phases has been proposed. In this context, we provide a solution to guarantee that unlinkability achieved by other techniques still holds when using a loyalty system.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, in the area of payment systems, the unlinkability of widthdrawal and desposit has been considered [12,9]. In [16], a solution to establish the unlinkability of the customer's search and order phases has been proposed. In this context, we provide a solution to guarantee that unlinkability achieved by other techniques still holds when using a loyalty system.…”
Section: Related Workmentioning
confidence: 99%
“…However, preventing this is out of scope of this work. In order to achieve unlinkability for electronic purchases in general, additional technologies have to be used, e.g., unlinkability of search and order phases proposed in [16], payment systems that allow the customer to remain anonymous with respect to the vendor [12,9], anonymity networks as in [11,27], or privacy-friendly delivery in case of hard goods similar to the approach proposed in [15].…”
Section: Requirementsmentioning
confidence: 99%