iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.CSI.2016.09.011
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T20:50:06Z","timestamp":1720039806193},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T00:00:00Z","timestamp":1474934400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000784","name":"European Parliament","doi-asserted-by":"publisher","award":["03210-02-00\/5127\/98400"],"id":[{"id":"10.13039\/501100000784","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards & Interfaces"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1016\/j.csi.2016.09.011","type":"journal-article","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T05:21:07Z","timestamp":1475212867000},"page":"76-82","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["Mass surveillance and technological policy options: Improving security of private communications"],"prefix":"10.1016","volume":"50","author":[{"given":"Stefan","family":"Schuster","sequence":"first","affiliation":[]},{"given":"Melle","family":"van den Berg","sequence":"additional","affiliation":[]},{"given":"Xabier","family":"Larrucea","sequence":"additional","affiliation":[]},{"given":"Ton","family":"Slewe","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Ide-Kostic","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1376","key":"10.1016\/j.csi.2016.09.011_bib1","article-title":"Unique in the crowd: the privacy bounds of human mobility","volume":"3","author":"de Montjoye","year":"2013","journal-title":"Nat. Sci. Rep."},{"key":"10.1016\/j.csi.2016.09.011_bib2","unstructured":"M. Barbaro, T. Zeller, The New York Times. [Online], Available: \u3008http:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html\u3009,\u00a009.08.2006 (accessed 23.09.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib3","unstructured":"A. Arnbak, Securing Private Communications: Protecting Private Communications Security in EU Law: Fundamental Rights, Functional Value Chains and Market Incentives, Amsterdam, 2015."},{"key":"10.1016\/j.csi.2016.09.011_bib4","unstructured":"Organisation for Economic Co-operation and Development (OECD), Report on the Cross Border Enforcement of Privay Laws. [Online], Available: \u3008http:\/\/www.oecd.org\/sti\/ieconomy\/37558845.pdf\u3009,\u00a02006 (accessed 27.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib5","unstructured":"University of Southern California, Is online privacy over? Findings from the USC Annenberg Center for the Digital Future show Millennials Embrace a New Online Reality. [Online], Available: \u3008http:\/\/annenberg.usc.edu\/news\/around-usc-annenberg\/online-privacy-over-findings-usc-annenberg-center-digital-future-show\u3009, (accessed 08.02.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib6","unstructured":"J. Tsai, S. Egelman, L. Cranor , A. Acquisti, The effect of online privacy information on purchasing behavior: an experimental study, in: Proceedings of the 6th Workshop on the Economics of Information Security, WEIS, Pittsburgh, PA, USA, 2007."},{"key":"10.1016\/j.csi.2016.09.011_bib7","doi-asserted-by":"crossref","unstructured":"E. Rose, Data users versus data subjects: are consumers willing to pay for property rights to personal information? in: Proceedings of the 38th Hawaii International Conference on System Sciences, 2005.","DOI":"10.1109\/HICSS.2005.184"},{"issue":"2","key":"10.1016\/j.csi.2016.09.011_bib8","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1086\/671754","article-title":"What is privacy worth?","volume":"42","author":"Acquisti","year":"2013","journal-title":"J. Leg. Stud."},{"key":"10.1016\/j.csi.2016.09.011_bib9","unstructured":"M. van den Berg, P. de Graaf (Eds.), P.O. Kwant, T. Slewe,\u00a0Mass surveillance - Part 2: Technology Foresight, Options for Longer Term Security and Privacy Improvements, EPRS\/European Parliamentary Research Service, Brussels, 2015."},{"key":"10.1016\/j.csi.2016.09.011_bib10","unstructured":"Electronic Frontier Foundation (EFF), EFF Secure Messaging Scorecard. [Online], Available: \u3008https:\/\/www.eff.org\/secure-messaging-scorecard\u3009, (accessed 27.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib11","series-title":"Mass Surveillance - Part 1: Risks and Opportunities Raised by the Current Generation of Network Services and Applications","article-title":"Linguistic review","author":"Gamino Garcia","year":"2015"},{"key":"10.1016\/j.csi.2016.09.011_bib12","unstructured":"B. S. a. J. Z. Matt Olsen, Don\u2019t Panic: Making Progress on the \u2018Going Dark\u2019 Debate.\u00a0[Online], Available: \u3008https:\/\/cyber.law.harvard.edu\/pubrelease\/dont-panic\/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf\u3009, 2016 (accessed 08.02.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib13","unstructured":"R. Gallagher, Future Tense. [Online], Available: \u3008http:\/\/www.slate.com\/blogs\/future_tense\/2013\/10\/30\/dark_mail_alliance_lavabit_silent_circle_team_up_to_create_surveillance.html\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib14","unstructured":"L. Levison, Kickstarter. [Online], Available: \u3008https:\/\/www.kickstarter.com\/projects\/ladar\/lavabits-dark-mail-initiative\/posts\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib15","unstructured":"Internet Security Research Group (ISRG), Let\u2019s Encrypt. [Online], Available: \u3008https:\/\/letsencrypt.org\/\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib16","unstructured":"PC World. [Online], Available: \u3008http:\/\/www.pcworld.com\/article\/2013534\/how-and-why-to-surf-the-web-in-secret.html\u3009, 2012 (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib17","unstructured":"JAP Anonymity & Privacy. [Online], Available: \u3008http:\/\/jap.inf.tu-dresden.de\/index_en.html\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib18","unstructured":"TOR Project blog. [Online], Available: \u3008https:\/\/blog.torproject.org\/blog\/tor-security-advisory-relay-early-traffic-confirmation-attack\/\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib19","unstructured":"Facebook, Making Connections to Facebook more Secure. [Online], Available: \u3008https:\/\/www.facebook.com\/notes\/protect-the-graph\/making-connections-to-facebook-more-secure\/1526085754298237\u3009, 2014 (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib20","unstructured":"A. C. a. M. Chanliau, Privacy and Security by Design: A Convergence of Paradigms. [Online], Available: \u3008https:\/\/www.ipc.on.ca\/site_documents\/PbDBook-From-Rhetoric-to-Reality-ch8.pdf\u3009, January 2013 (accessed 7.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib21","unstructured":"Dyn Research, The New Threat: Targeted Internet Traffic Misdirection. [Online], Available: \u3008http:\/\/research.dyn.com\/2013\/11\/mitm-internet-hijacking\/\u3009, (accessed 08.02.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib22","unstructured":"Google, DNS Security Threats and mitigations. [Online], Available: \u3008https:\/\/developers.google.com\/speed\/public-dns\/docs\/security\u3009, (accessed 08.02.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib23","unstructured":"K. McCarthy, Dutch Govt Says no to Backdoors, Slides $540k into OpenSSL Without Breaking Eye Contact. [Online], Available: \u3008http:\/\/www.theregister.co.uk\/2016\/01\/04\/dutch_government_says_no_to_backdoors\/\u3009, 4.01.2016 (accessed 20.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib24","unstructured":"E. I. Observatory, ICT Market Report 2015\/16. [Online], Available: \u3008www.eito.com\u3009."},{"key":"10.1016\/j.csi.2016.09.011_bib25","unstructured":"L. O\u2019Donnell, Electronic Frontiers Australia. [Online], Available: \u3008https:\/\/www.efa.org.au\/2015\/07\/29\/european-data-retention-laws-update\/\u3009, (accessed 27.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib26","unstructured":"ProPublica. [Online], Available: \u3008http:\/\/www.propublica.org\/documents\/item\/802269-untitled0001.html\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib27","unstructured":"T. Meyer ,J. Elliott, ProPublica. [Online], Available: \u3008http:\/\/www.propublica.org\/article\/claim-on-attacks-thwarted-by-nsa-spreads-despite-lack-of-evidence\u3009, (accessed 17.12.15)."},{"key":"10.1016\/j.csi.2016.09.011_bib28","doi-asserted-by":"crossref","unstructured":"J. Kilian, y F. T. Leighton, \u00abFair cryptosystems, revisited: a rigorous approach to key-escrow\u00bb, in: de crypto '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, 1995.","DOI":"10.1007\/3-540-44750-4_17"},{"key":"10.1016\/j.csi.2016.09.011_bib29","unstructured":"S. B, D. Hammerstein, The EU and the Commons: A Commons Approach to European Knowledge Policy. [Online], Available: \u3008http:\/\/commonsnetwork.eu\/wp-content\/uploads\/2015\/06\/A-Commons-Approach-to-European-Knowledge-Policy.pdf\u3009, July 2015 (accessed 25.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib30","unstructured":"S. M. a. Bellovin, Going Bright: Wiretapping without Weakening Communications Infrastructure. [Online], Available: \u3008https:\/\/www.cs.columbia.edu\/~smb\/papers\/GoingBright.pdf\u3009, January\/February 2013 (accessed 20.01.16)."},{"key":"10.1016\/j.csi.2016.09.011_bib31","series-title":"De-Perimeterisation: Benefits and Limitations","author":"Palmer","year":"2005"},{"key":"10.1016\/j.csi.2016.09.011_bib32","series-title":"Ubiquitous Security for Ubiquitous Computing","author":"Hayat","year":"2007"}],"container-title":["Computer Standards & Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548916300988?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548916300988?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T21:57:03Z","timestamp":1536357423000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548916300988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":32,"alternative-id":["S0920548916300988"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2016.09.011","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mass surveillance and technological policy options: Improving security of private communications","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2016.09.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}