Reference Hub2
Indices4
Anonymous Security Systems and Applications: Requirements and Solutions

Anonymous Security Systems and Applications: Requirements and Solutions

Copyright: © 2012 |Pages: 265
ISBN13: 9781466616493|ISBN10: 1466616490|EISBN13: 9781466616509
DOI: 10.4018/978-1-4666-1649-3
Cite Book Cite Book

MLA

Tamura, Shinsuke. Anonymous Security Systems and Applications: Requirements and Solutions. IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1649-3

APA

Tamura, S. (2012). Anonymous Security Systems and Applications: Requirements and Solutions. IGI Global. https://doi.org/10.4018/978-1-4666-1649-3

Chicago

Tamura, Shinsuke. Anonymous Security Systems and Applications: Requirements and Solutions. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1649-3

Export Reference

Mendeley
Favorite Full-Book Download

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners.

Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Introduction  (pages 14-14)
Introduction
This content has been removed at the discretion of the publisher and the editors.
Data and Communication Security in Anonymous Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Developing Secure Anonymous Systems
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.