Juels, 2001 - Google Patents
Targeted advertising... and privacy tooJuels, 2001
View PDF- Document ID
- 12685330783627716820
- Author
- Juels A
- Publication year
- Publication venue
- Cryptographers’ Track at the RSA Conference
External Links
Snippet
The Web presents a rich and powerful tool for aggregation of consumer information. A flurry of recent articles in the popular press has documented aggressive manipulation of such information by some companies for the purposes of targeted advertising. While advertisers …
- 230000002776 aggregation 0 abstract description 5
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Juels | Targeted advertising... and privacy too | |
US7472093B2 (en) | Targeted delivery of informational content with privacy protection | |
US8094810B2 (en) | Unidirectional proxy re-encryption | |
JP4639084B2 (en) | Encryption method and encryption apparatus for secure authentication | |
Schechter et al. | Anonymous authentication of membership in dynamic groups | |
US7359507B2 (en) | Server-assisted regeneration of a strong secret from a weak secret | |
US8855317B2 (en) | System for protecting an encrypted information unit | |
US6952769B1 (en) | Protocols for anonymous electronic communication and double-blind transactions | |
Lindell | Anonymous authentication | |
US8654975B2 (en) | Joint encryption of data | |
Khurana | Scalable security and accounting services for content-based publish/subscribe systems | |
Wang et al. | A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system | |
US6243466B1 (en) | Auto-escrowable and auto-certifiable cryptosystems with fast key generation | |
Jakobsson et al. | Proprietary certificates | |
CN108171076A (en) | Protect the big data correlation analysis and system of consumer privacy in electronic transaction | |
Lin et al. | Jack: Scalable accumulator-based Nymble system | |
Gritti et al. | Broadcast encryption with dealership | |
Tzeng | A secure system for data access based on anonymous authentication and time-dependent hierarchical keys | |
Shinde et al. | Faster RSA algorithm for decryption using Chinese remainder theorem | |
Sun et al. | A new post-quantum voting protocol based on physical laws. | |
Pereira et al. | On the perfect encryption assumption | |
Zhang et al. | Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services | |
Yang et al. | Towards practical anonymous password authentication | |
JP2009171384A (en) | ENCRYPTION INFORMATION GENERATION DEVICE AND ITS PROGRAM, PRIVATE KEY GENERATION DEVICE AND ITS PROGRAM, CONTENT DECRYPTION DEVICE AND ITS PROGRAM | |
JP4875481B2 (en) | Encrypted information generating device and program thereof, secret key generating device and program thereof, distribution content generating device and program thereof, and content decrypting device and program thereof |