Chaum, D. (1981). Untraceable electronic mail, return ad-
dresses, and digital pseudonyms. Commun. ACM,
24(2):84–90.
Chaum, D. and van Heyst, E. (1991). Group signatures. In
Advances in Cryptology – EUROCRYPT ’91, LNCS,
pages 257–265.
CSI (2007). Computer Crime and Security Sur-
vey 2007, Computer Security Institute.
http://www.gocsi.com/forms/csi survey.jhtml.
Danezis, G. and Diaz, C. (2008). A Survey of Anonymous
Communication Channels. Technical Report MSR-
TR-2008-35, Microsoft Research.
Danezis, G., Dingledine, R., and Mathewson, N. (2003).
Mixminion: Design of a Type III Anonymous Re-
mailer Protocol. In SP ’03: Proceedings of the 2003
IEEE Symposium on Security and Privacy, pages 2–
15, Washington, DC, USA. IEEE Computer Society.
Demuynck, L. and Decker, B. D. (2005). Privacy-
Preserving Electronic Health Records. In Commu-
nications and Multimedia Security, 9th IFIP TC-6
TC-11 International Conference (CMS 2005), volume
3677 of LNCS, pages 150–159. Springer-Verlag.
Dingledine, R., Mathewson, N., and Syverson, P. (2004).
Tor: The Second-Generation Onion Router. In Pro-
ceedings of the 13th USENIX Security Symposium,
pages 21–21.
Dodis, Y., Kiayias, A., Nicolosi, A., and Shoup, V. (2004).
Anonymous Identification in Ad Hoc Groups. In
Advances in Cryptology - EUROCRYPT’04, volume
3027 of LNCS, pages 609–626.
Federrath, H. (2005). Privacy Enhanced Technologies:
Methods, Markets, Misuse. In Proceedings of the 2nd
International Conference on Trust, Privacy, and Secu-
rity in Digital Business (TrustBus ’05), volume 3592
of LNCS, pages 1–9. Springer-Verlag.
HI (2004). Harris Interactive, Survey on Medical Privacy.
http://www.harrisinteractive.com/news/newsletters/
healthnews/HI HealthCareNews2004Vol4 Iss13.pdf.
Lindell, Y. (2007). Anonymous Authenticaion.
Whitepaper Aladdin Knowledge Systems, 2007,
http://www.aladdin.com/blog/pdf/Anonymous
Authentication.pdf.
Naor, M. (2002). Deniable Ring Authentication. In
CRYPTO ’02: Proceedings of the 22nd Annual Inter-
national Cryptology Conference on Advances in Cryp-
tology, LNCS, pages 481–498. Springer-Verlag.
Pfitzmann, A. and K¨ohntopp, M. (2000). Anonymity,
Unobservability, and Pseudonymity - A Proposal for
Terminology. In Workshop on Design Issues in
Anonymity and Unobservability, pages 1–9.
Pyper, C., Amery, J., Watson, M., and Crook, C. (2004).
Access to Electronic health records in primary care –
a survey of patients views. Med Sci Monit, 10(11):17–
22.
Riedl, B., Grascher, V., and Neubauer, T. (2008). A Se-
cure e-Health Architecture based on the Appliance of
Pseudonymization. Journal of Software, 3(2):23–32.
Riedl, B., Neubauer, T., Goluch, G., Boehm, O., Reinauer,
G., and Krumboeck, A. (2007). A Secure Architec-
ture for the Pseudonymization of Medical Data. In
Proceedings of the The Second International Confer-
ence on Availability, Reliability and Security (ARES
2007), pages 318–324. IEEE Computer Society.
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How
to Leak a Secret. In Advances in Cryptology – ASI-
ACRYPT ’01, LNCS, pages 552–565. Springer.
Schechter, S., Parnell, T., and Hartemink, A. (1999).
Anonymous Authentication of Membership in Dy-
namic Groups. In Proc. International Conference on
Financial Cryptography 99, volume 1648 of LNCS,
pages 184–195. Springer-Verlag.
Slamanig, D. and Stingl, C. (2008a). Anonymous Au-
thentication - Principles and Application (German).
In Horster, P., editor, Proceedings of DACH-Security
2008, pages 123–134. IT-Verlag.
Slamanig, D. and Stingl, C. (2008b). Privacy Aspects of
eHealth. In Proceedings of theThe Third International
Conference on Availability, Reliability and Security
(ARES 2008), pages 1226–1233. IEEE Computer So-
ciety.
Slamanig, D., Stingl, C., Lackner, G., and Payer, U. (2007).
Preserving Privacy in a Web-based Multiuser-System
(German). In Horster, P., editor, Proceedings of
DACH-Security 2007, pages 98–110. IT-Verlag.
Steinbrecher, S. and K¨opsell, S. (2003). Modelling Un-
linkability. In Proceedings of Privacy Enhancing
Technologies workshop (PET 2003), volume 2760 of
LNCS, pages 32–47. Springer-Verlag.
Stingl, C., Slamanig, D., Rauner-Reithmayer, D., and Fis-
cher, H. (2006). Realization of a Secure and Central-
ized Data Repository (German). In Horster, P., editor,
Proceedings of DACH Security 2006, pages 32–45. IT-
Verlag.
TCG (2008). Trusted Computing Group.
http://www.trustedcomputinggroup.org.
Win, K. T. (2005). A review of security of electronic health
records. HIM J, 34(1):13–8.
HEALTHINF 2009 - International Conference on Health Informatics
264