Amazon cover image
Image from Amazon.com

Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers / George Danezis, David Martin (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 3856.Publication details: Berlin ; New York : Springer, 2006.Description: 1 online resource (viii, 272 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540347460
  • 3540347461
  • 3540347453
  • 9783540347453
Other title:
  • PET 2005
Subject(s): Genre/Form: Additional physical formats: Print version:: Privacy enhancing technologies.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 P443 2005
Other classification:
  • 54.62
  • 54.69
  • TP309-532
  • SS 4800
  • ST 276
  • 004
  • DAT 050f
  • DAT 461f
Online resources:
Contents:
Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.
In: OhioLINK electronic book center In: SpringerLink
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.

Available to OhioLINK libraries.

Powered by Koha