[go: up one dir, main page]

Juels, 2001 - Google Patents

Targeted advertising... and privacy too

Juels, 2001

View PDF
Document ID
12685330783627716820
Author
Juels A
Publication year
Publication venue
Cryptographers’ Track at the RSA Conference

External Links

Snippet

The Web presents a rich and powerful tool for aggregation of consumer information. A flurry of recent articles in the popular press has documented aggressive manipulation of such information by some companies for the purposes of targeted advertising. While advertisers …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Juels Targeted advertising... and privacy too
US7472093B2 (en) Targeted delivery of informational content with privacy protection
US8094810B2 (en) Unidirectional proxy re-encryption
JP4639084B2 (en) Encryption method and encryption apparatus for secure authentication
Schechter et al. Anonymous authentication of membership in dynamic groups
US7359507B2 (en) Server-assisted regeneration of a strong secret from a weak secret
US8855317B2 (en) System for protecting an encrypted information unit
US6952769B1 (en) Protocols for anonymous electronic communication and double-blind transactions
Lindell Anonymous authentication
US8654975B2 (en) Joint encryption of data
Khurana Scalable security and accounting services for content-based publish/subscribe systems
Wang et al. A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system
US6243466B1 (en) Auto-escrowable and auto-certifiable cryptosystems with fast key generation
Jakobsson et al. Proprietary certificates
CN108171076A (en) Protect the big data correlation analysis and system of consumer privacy in electronic transaction
Lin et al. Jack: Scalable accumulator-based Nymble system
Gritti et al. Broadcast encryption with dealership
Tzeng A secure system for data access based on anonymous authentication and time-dependent hierarchical keys
Shinde et al. Faster RSA algorithm for decryption using Chinese remainder theorem
Sun et al. A new post-quantum voting protocol based on physical laws.
Pereira et al. On the perfect encryption assumption
Zhang et al. Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Yang et al. Towards practical anonymous password authentication
JP2009171384A (en) ENCRYPTION INFORMATION GENERATION DEVICE AND ITS PROGRAM, PRIVATE KEY GENERATION DEVICE AND ITS PROGRAM, CONTENT DECRYPTION DEVICE AND ITS PROGRAM
JP4875481B2 (en) Encrypted information generating device and program thereof, secret key generating device and program thereof, distribution content generating device and program thereof, and content decrypting device and program thereof