![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Fuchs Christian
Publisher: MDPI
E-ISSN: 2078-2489|2|1|140-165
ISSN: 2078-2489
Source: Information, Vol.2, Iss.1, 2011-02, pp. : 140-165
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Bulletin of the Association for Information Science and Technology, Vol. 42, Iss. 1, 2015-10 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Future Internet, Vol. 6, Iss. 2, 2014-06 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Information Extraction Under Privacy Constraints
By Asoodeh Shahab Diaz Mario Alajaji Fady Linder Tamás
Information, Vol. 7, Iss. 1, 2016-03 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Trust and Privacy in Our Networked World
By Tavani Herman T. Arnold Dieter
Information, Vol. 2, Iss. 4, 2011-10 ,pp. :