Privacy Enhancing Technologies : Second International Workshop, PET 2002 San Francisco, CA, USA, April 1415, 2002 Revised Papers / edited by Roger Dingledine, Paul Syverson.
Material type:
TextSeries: Lecture notes in computer science ; 2482,Publication details: Berlin ; Heidelberg : Springer-Verlag Berlin Heidelberg, 2003.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783540364672
- 3540364676
- 9783540005650
- 354000565X
- Computer science
- Computer Communication Networks
- Operating systems (Computers)
- Data encryption (Computer science)
- Information storage and retrieval systems
- Information Systems
- Data Encryption
- Operating Systems
- Information Storage and Retrieval
- Computers and Society
- Management of Computing and Information Systems
- Informatique
- Systèmes d'exploitation (Ordinateurs)
- Chiffrement (Informatique)
- Systèmes d'information
- operating systems
- Computer science
- Data encryption (Computer science)
- Information storage and retrieval systems
- Operating systems (Computers)
- 005.82 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002. The 17 revised full papers presented were carefully selected during two rounds of reviewing and improvement. Among the topics addressed are Internet security, private authentication, information theoretic anonymity, anonymity measuring, enterprise privacy practices, service architectures for privacy, intersection attacks, online trust negotiation, random data perturbation, Website fingerprinting, Web user privacy, TCP timestamps, private information retrieval, and unobservable Web surfing.
Privacy-Enhancing Technologies for the Internet, II: Five Years Later -- Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education -- Private Authentication -- Towards an Information Theoretic Metric for Anonymity -- Towards Measuring Anonymity -- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data -- Privacy Enhancing Profile Disclosure -- Privacy Enhancing Service Architectures -- Dummy Traffic against Long Term Intersection Attacks -- Protecting Privacy during On-Line Trust Negotiation -- Prototyping an Armored Data Vault -- Preventing Interval-Based Inference by Random Data Perturbation -- Fingerprinting Websites Using Traffic Analysis -- A Passive Attack on the Privacy of Web Users Using Standard Log Information -- Covert Messaging through TCP Timestamps -- Almost Optimal Private Information Retrieval -- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?
Includes bibliographical references and index.
English.