E-Book, Englisch, Band 4258, 434 Seiten, eBook
Danezis / Golle Privacy Enhancing Technologies
2006
ISBN: 978-3-540-68793-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
E-Book, Englisch, Band 4258, 434 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-68793-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
6th Workshop on Privacy Enhancing Technologies.- Privacy for Public Transportation.- Ignoring the Great Firewall of China.- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.- Privacy Injector — Automated Privacy Enforcement Through Aspects.- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises.- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.- Protecting Privacy with the MPEG-21 IPMP Framework.- Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement.- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing.- Selectively Traceable Anonymity.- Valet Services: Improving Hidden Servers with a Personal Touch.- Blending Different Latency Traffic with Alpha-mixing.- Private Resource Pairing.- Honest-Verifier Private Disjointness Testing Without Random Oracles.- A Flexible Framework for Secret Handshakes.- On the Security of the Tor Authentication Protocol.- Optimal Key-Trees for Tree-Based Private Authentication.- Simple and Flexible Revocation Checking with Privacy.- Breaking the Collusion Detection Mechanism of MorphMix.- Linking Anonymous Transactions: The Consistent View Attack.- Preserving User Location Privacy in Mobile Data Management Infrastructures.- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.