{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T16:37:18Z","timestamp":1779122238826,"version":"3.51.4"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"value":"9780387736549","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_15","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"223-238","source":"Crossref","is-referenced-by-count":7,"title":["A Framework for Privacy-Preserving E-learning"],"prefix":"10.1007","author":[{"given":"Esma","family":"A\u00efmeur","sequence":"first","affiliation":[]},{"given":"Hicham","family":"Hage","sequence":"additional","affiliation":[]},{"given":"Flavien Serge","family":"Mani Onana","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Arroyo, I., and Park Woolf, B.: \u201cInferring Learning and Attitudes from a Bayesian Network of Log File Data\u201d. International Conference on Artificial Intelligence in Education (AIED 2005), pp 33\u201340, Amsterdam, 2005."},{"key":"15_CR2","unstructured":"Westin, A.: Privacy and Freedom (Atheneum, New York, 1967)."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"A\u00efmeur, E., Brassard, G., Fernandez, J.M., and Mani Onana, F. S.: \u201cPrivacy-Preserving demographic filtering\u201d. The 21st Annual ACM Symposium on Applied Computing, pp 872\u2013878, Dijon, 2006.","DOI":"10.1145\/1141277.1141479"},{"key":"15_CR4","unstructured":"Mani Onana, F. S.: \u201cVie priv\u00e9e en commerce \u00e9lectronique\u201d. Ph.D. Thesis, D\u00e9partement d\u2019informatique et de recherche op\u00e9rationnelle, Universit\u00e9 de Montr\u00e9al, Mai 2006."},{"issue":"8","key":"15_CR5","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/ICALT.2005.236","volume":"5","author":"R. Raitman","year":"2005","unstructured":"Raitman, R., Ngo, L., Augar, N., and Zhou, W.: \u201cSecurity in the online e-learning environment\u201d. IEEE International Conference on Advanced Learning Technologies (ICALT 2005), 5(8), pp 702\u2013706, 2005.","journal-title":"IEEE International Conference on Advanced Learning Technologies (ICALT 2005)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Franz, E., Wahrig, H., Boettcher, A., and Borcea-Pfitzmann, K.: \u201cAccess Control in a Privacy-Aware eLearning Environment\u201d. International Conference on Availability, Reliability and Security (ARES 2006), pp 879\u2013886, Vienna, 2006.","DOI":"10.1109\/ARES.2006.20"},{"key":"15_CR7","unstructured":"Yee, G., and Korba, L.: \u201cThe Negotiation of Privacy Policies in Distance Education\u201d. Information Resources Management Association International Conference (IRMA 2003), Philadelphia, 2003."},{"issue":"10","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: \u201cSecurity without identification: Transaction systems to make Big Brother obsolete\u201d. Communications of the ACM, 28(10), pp 1030\u20131044, 1985.","journal-title":"Communications of the ACM"},{"key":"15_CR9","first-page":"118","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86, volume 263 of Lecture Notes in Computer Science","author":"D. Chaum","year":"1987","unstructured":"Chaum, D., and Evertse, J.: A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. In Andrew M. Odlyzko, editor, Advances in Cryptology \u2014 CRYPTO\u2019 86, volume 263 of Lecture Notes in Computer Science, pp 118\u2013167 (Springer, Berlin, 1987)."},{"key":"15_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructure and Digital Certificates \u2014 Building in Privacy","author":"S. Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates \u2014 Building in Privacy. (MIT Press, Cambridge, 2000)."},{"key":"15_CR11","first-page":"93","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science","author":"J. Camenish","year":"2001","unstructured":"Camenish, J., and Lysyanskaya, A.: An Efficient System for None-transferable Anonymous Credentials with Optional Anonymity Revocation. In Birgit Pfitzmann, editor, Advances in Cryptology \u2014 EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pp 93\u2013118 (Springer, Berlin, 2001)."},{"key":"15_CR12","first-page":"184","volume-title":"Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science","author":"A. Lysyanskaya","year":"1999","unstructured":"Lysyanskaya, A., Rivest, R. L., Sahai, A., and Wolf S.: In Howard Heys and Carlisle Adams, editors, Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, pp 184\u2013199 (Springer, Berlin, 1999)."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Sander, T., and Tschudin, C.: \u201cTowards mobile cryptography\u201d. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp 215\u2013224, Oakland, 1998.","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"15_CR14","unstructured":"Boyan, J.: \u201cThe Anonymizer: Protecting user privacy on the Web\u201d. Computer-Mediated Communication Magazine, 4(9), 1997."},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/293411.293447","volume":"42","author":"E. Gabber","year":"1999","unstructured":"Gabber, E., Gibbons, P.B., Kristol, D.M., Matias Y. and Mayer A.J.: \u201cConsistent, yet anonymous, web access with LPWA\u201d. Communications of the ACM, 42(2), pp. 42\u201347, 1999.","journal-title":"Communications of the ACM"},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: \u201cUntraceable electronic mail, return addresses, and digital pseudonyms\u201d. Communications of the ACM, 24(2), pp. 84\u201390, 1981.","journal-title":"Communications of the ACM"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:38Z","timestamp":1619669558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_15","relation":{},"subject":[]}}