Paper Recommendation
1978 A Method For Obtaining Digital Signatures and Public-key Cryptosystems

1986 How To Generate and Exchange Secrets

1979 Privacy and Authentication: An introduction To Cryptography

1991 Trends in Cellular and Cordless Communications

1981 Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

1970 Privacy and Freedom

1996 Decentralized Trust Management

1998 Protecting Privacy When Disclosing information: K-anonymity and Its Enforcement Through Generalization and Suppression

1990 The Persistence of Privacy: Autonomy and initiative in Teachers' Professional Relations.

1985 A Robust and Verifiable Cryptographically Secure Election Scheme

1995 NetBill: An internet Commerce System Optimized For Network-delivered Services

1988 Privacy Amplification By Public Discussion

2000 Automated Trust Negotiation

1996 Role-based Access Control Models

1973 A Note on The Confinement Problem

2002 K -anonymity: A Model For Protecting Privacy

1977 An Extension of The Shannon Theory Approach To Cryptography

1982 Protocols For Secure Computations

1999 For The Common Good

2002 Location Sensing and Privacy in A Context-aware Computing Environment