Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers / George Danezis, David Martin (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 3856.Publication details: Berlin ; New York : Springer, 2006.Description: 1 online resource (viii, 272 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540347460
- 3540347461
- 3540347453
- 9783540347453
- PET 2005
- Computer security -- Congresses
- Computer networks -- Security measures -- Congresses
- Data protection -- Congresses
- Protection de l'information (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Computer networks -- Security measures
- Protection de l'information (Informatique)
- Réseaux d'ordinateurs -- Sécurité -- Mesures
- Computer security
- Informatique
- Data protection
- Computer networks -- Security measures
- Computer security
- Anonymität
- Datenschutz
- Datensicherung
- Privatsphäre
- Internet
- computers
- samenleving
- society
- informatieontsluiting
- information retrieval
- informatieopslag
- information storage
- informatiesystemen
- information systems
- computerwetenschappen
- computer sciences
- computernetwerken
- computer networks
- gegevensbeheer
- data management
- operating systems
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 22
- QA76.9.A25 P443 2005
- 54.62
- 54.69
- TP309-532
- SS 4800
- ST 276
- 004
- DAT 050f
- DAT 461f
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and index.
Print version record.
Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.
Available to OhioLINK libraries.