Privacy Enhancing Technologies
Springer Berlin (Verlag)
978-3-642-03167-0 (ISBN)
This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009.
The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
Ninth Privacy Enhancing Technologies Symposium.- Capturing Social Networking Privacy Preferences:.- Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design.- A Comparative Study of Online Privacy Policies and Formats.- Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications.- Scalable Link-Based Relay Selection for Anonymous Routing.- Using Linkability Information to Attack Mix-Based Anonymity Services.- Physical Layer Attacks on Unlinkability in Wireless LANs.- RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests.- Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default.- Privacy-Preserving Policy-Based Information Transfer.- Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.- APOD: Anonymous Physical Object Delivery.- On the Optimal Placement of Mix Zones.- Privacy-Preserving Face Recognition.
Erscheint lt. Verlag | 14.7.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 255 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 410 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aggregate query • anonymity • authentication • Certification • Collaborative Filtering • Fault-Tolerance • Firewall • Hardcover, Softcover / Informatik, EDV/Informatik • Identity Management • Integrity • Key Management • location privacy • mining default policies • Network Security • outsource • p2p syst • P2P Systems • privacy • privacy preservation • secret handshakes • Secret Sharing • security attacks • sender anonymity • Social Networks • traffic analysis • User Modeling • verification |
ISBN-10 | 3-642-03167-6 / 3642031676 |
ISBN-13 | 978-3-642-03167-0 / 9783642031670 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich