M. Allen, D. Armstrong, M. Reid, and C. Riemenschneider. Proceedings of the special interest group on management information system's 47th annual conference on Computer personnel research, page 95--100. New York, NY, USA, ACM, (2009)
R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.
C. Blackwell. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 45:1--45:4. New York, NY, USA, ACM, (2009)
K. Brancik, and G. Ghinita. Proceedings of the first ACM conference on Data and application security and privacy, page 231--236. New York, NY, USA, ACM, (2011)
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY, page 46--66. Springer-Verlag New York, Inc., (2001)
K. Desouza, and G. Vanapalli. System Sciences, 2005. HICSS '05. Proceedings of the 38th Annual Hawaii International Conference on, page 27b. (January 2005)