Amazon cover image
Image from Amazon.com

Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers / Nikita Borisov, Philippe Golle (eds.).

By: Contributor(s): Material type: TextTextPublisher number: 12171590Series: Lecture notes in computer science ; 4776. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2007.Description: 1 online resource (x, 271 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540755517
  • 3540755519
  • 9783540755500
  • 3540755500
Other title:
  • PET 2007
Subject(s): Genre/Form: Additional physical formats: Print version:: Privacy enhancing technologies.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 P443 2007eb
Other classification:
  • SS 4800
  • 004
  • DAT 461f
  • DAT 050f
Online resources:
Contents:
Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.
Summary: This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in Ottawa, Canada, in June 2007 in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The 16 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in Ottawa, Canada, in June 2007 in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The 16 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

Powered by Koha