TY - BOOK AU - Danezis,George AU - Martin,David ED - PET 2005 TI - Privacy enhancing technologies: 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers T2 - Lecture notes in computer science, SN - 9783540347460 AV - QA76.9.A25 P443 2005 U1 - 005.8 22 PY - 2006/// CY - Berlin, New York PB - Springer KW - Computer security KW - Congresses KW - Computer networks KW - Security measures KW - Data protection KW - Protection de l'information (Informatique) KW - Congrès KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Sécurité informatique KW - COMPUTERS KW - Internet KW - Security KW - bisacsh KW - Networking KW - General KW - cct KW - Informatique KW - eclas KW - fast KW - Anonymität KW - gnd KW - Datenschutz KW - Datensicherung KW - Privatsphäre KW - computers KW - samenleving KW - society KW - informatieontsluiting KW - information retrieval KW - informatieopslag KW - information storage KW - informatiesystemen KW - information systems KW - computerwetenschappen KW - computer sciences KW - computernetwerken KW - computer networks KW - gegevensbeheer KW - data management KW - operating systems KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf KW - Cavtat (2006) KW - swd KW - Kongress N1 - Includes bibliographical references and index; Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective; Available to OhioLINK libraries UR - https://link.springer.com/10.1007/11767831 ER -