• Taher P, Boloorchi A and Samadzadeh M. (2018). Age-based anonymity. Telecommunications Systems. 69:2. (223-235). Online publication date: 1-Oct-2018.

    https://doi.org/10.1007/s11235-018-0459-8

  • Yee G and Yee G. Model for reducing risks to private or sensitive data. Proceedings of the 9th International Workshop on Modelling in Software Engineering. (19-25).

    /doi/10.5555/3104068.3104076

  • Brandi W and Olivier M. In search of search privacy. Proceedings of the 7th international conference on Trust, privacy and security in digital business. (102-116).

    /doi/10.5555/1894888.1894902

  • Kolter J, Kernchen T and Pernul G. (2010). Collaborative privacy management. Computers and Security. 29:5. (580-591). Online publication date: 1-Jul-2010.

    https://doi.org/10.1016/j.cose.2009.12.007

  • Nyre Å and Jaatun M. Privacy in a Semantic Cloud. Proceedings of the 1st International Conference on Cloud Computing. (107-118).

    https://doi.org/10.1007/978-3-642-10665-1_10

  • Muñoz-Gea J, Malgosa-Sanahuja J, Manzanares-Lopez P, Sanchez-Aarnoutse J and Garcia-Haro J. (2009). Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths. Computers and Security. 28:8. (772-784). Online publication date: 1-Nov-2009.

    https://doi.org/10.1016/j.cose.2009.05.001

  • Wang H, Sheng B and Li Q. (2009). Privacy-aware routing in sensor networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 53:9. (1512-1529). Online publication date: 25-Jun-2009.

    https://doi.org/10.1016/j.comnet.2009.02.002

  • Ghani N and Sidek Z. Personal information and privacy in E-commerce application. Proceedings of the 7th WSEAS international conference on Information security and privacy. (28-32).

    /doi/10.5555/1576645.1576650

  • Yee G. A privacy controller approach for privacy protection in web services. Proceedings of the 2007 ACM workshop on Secure web services. (44-51).

    https://doi.org/10.1145/1314418.1314426

  • Flegel U and Meier M. Authorization architectures for privacy-respecting surveillance. Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice. (1-17).

    /doi/10.5555/2394420.2394421

  • Wahlstrom K and Quirchmayr G. The motivation and proposition of a privacy-enhancing architecture for operational databases. Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68. (173-182).

    /doi/10.5555/1274531.1274552

  • Yee G. A privacy-preserving UBICOMP architecture. Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. (1-8).

    https://doi.org/10.1145/1501434.1501467

  • Kruger L, Jha S, Goh E and Boneh D. Secure function evaluation with ordered binary decision diagrams. Proceedings of the 13th ACM conference on Computer and communications security. (410-420).

    https://doi.org/10.1145/1180405.1180455

  • Hafiz M. A collection of privacy design patterns. Proceedings of the 2006 conference on Pattern languages of programs. (1-13).

    https://doi.org/10.1145/1415472.1415481

  • Christandl M and Wehner S. Quantum anonymous transmissions. Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security. (217-235).

    https://doi.org/10.1007/11593447_12

  • Oppliger R. (2005). Short Survey. Computer Communications. 28:16. (1791-1797). Online publication date: 1-Oct-2005.

    https://doi.org/10.1016/j.comcom.2005.02.003

  • Jha S, Kruger L and McDaniel P. Privacy preserving clustering. Proceedings of the 10th European conference on Research in Computer Security. (397-417).

    https://doi.org/10.1007/11555827_23

  • Tillwick H and Olivier M. Towards a framework for connection anonymity. Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. (113-122).

    /doi/10.5555/1145675.1145688

  • Olivier M. Distributed proxies for browsing privacy. Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. (104-112).

    /doi/10.5555/1145675.1145687

  • Clark D, Wroclawski J, Sollins K and Braden R. (2005). Tussle in cyberspace. IEEE/ACM Transactions on Networking. 13:3. (462-475). Online publication date: 1-Jun-2005.

    https://doi.org/10.1109/TNET.2005.850224

  • Olivier M. Flocks. Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. (79-88).

    /doi/10.5555/1035053.1035063

  • Olivier M. Using organisational safeguards to make justifiable privacy decisions when processing personal data. Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology. (275-284).

    /doi/10.5555/954014.954044

  • Farkas C, Ziegler G, Meretei A and Lörincz A. Anonymity and accountability in self-organizing electronic communities. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. (81-90).

    https://doi.org/10.1145/644527.644536

  • Rocha B, Almeida V, Ishitani L and Meira W. Disclosing users' data in an environment that preserves privacy. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. (71-80).

    https://doi.org/10.1145/644527.644535

  • Clark D, Wroclawski J, Sollins K and Braden R. (2002). Tussle in cyberspace. ACM SIGCOMM Computer Communication Review. 32:4. (347-356). Online publication date: 1-Oct-2002.

    https://doi.org/10.1145/964725.633059

  • Clark D, Wroclawski J, Sollins K and Braden R. Tussle in cyberspace. Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications. (347-356).

    https://doi.org/10.1145/633025.633059

  • Goldberg I. Privacy-enhancing technologies for the internet, II. Proceedings of the 2nd international conference on Privacy enhancing technologies. (1-12).

    /doi/10.5555/1765299.1765300

  • Agrawal R and Srikant R. (2000). Privacy-preserving data mining. ACM SIGMOD Record. 29:2. (439-450). Online publication date: 1-Jun-2000.

    https://doi.org/10.1145/335191.335438

  • Agrawal R and Srikant R. Privacy-preserving data mining. Proceedings of the 2000 ACM SIGMOD international conference on Management of data. (439-450).

    https://doi.org/10.1145/342009.335438

  • Mazières D and Kaashoek M. The design, implementation and operation of an email pseudonym server. Proceedings of the 5th ACM conference on Computer and communications security. (27-36).

    https://doi.org/10.1145/288090.288098

  • Fox A, Gribble S, Chawathe Y, Brewer E and Gauthier P. (1997). Cluster-based scalable network services. ACM SIGOPS Operating Systems Review. 31:5. (78-91). Online publication date: 1-Dec-1997.

    https://doi.org/10.1145/269005.266662

  • Fox A, Gribble S, Chawathe Y, Brewer E and Gauthier P. Cluster-based scalable network services. Proceedings of the sixteenth ACM symposium on Operating systems principles. (78-91).

    https://doi.org/10.1145/268998.266662