Privacy Enhancing Technologies
Springer Berlin (Verlag)
978-3-540-26203-9 (ISBN)
Anonymity and Covert Channels in Simple Timed Mix-Firewalls.- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.- The Traffic Analysis of Continuous-Time Mixes.- Reputable Mix Networks.- Secure Outsourcing of Sequence Comparisons.- An Improved Construction for Universal Re-encryption.- Electromagnetic Eavesdropping Risks of Flat-Panel Displays.- On the Anonymity of Banknotes.- FLASCHE - A Mechanism Providing Anonymity for Mobile Users.- Cryptographically Protected Prefixes for Location Privacy in IPv6.- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.- Synchronous Batching: From Cascades to Free Routes.- On Flow Correlation Attacks and Countermeasures in Mix Networks.- Measuring Anonymity in a Non-adaptive, Real-Time System.- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?.- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".- A Formal Privacy System and Its Application to Location Based Services.- Privacy-Preserving Trust Negotiations.- Language-Based Enforcement of Privacy Policies.- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior.- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
Erscheint lt. Verlag | 30.5.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VIII, 345 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 508 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | anonymity • anonymization • Communication • Distributed Information Systems • Internet Services • Intrusion Detection • IPv6 • IPv6 privacy • LA • Network Security • privacy • Privacy Protection • private information retrieval • Trust • ubiquitous computing • web security • Web traffic analysis |
ISBN-10 | 3-540-26203-2 / 3540262032 |
ISBN-13 | 978-3-540-26203-9 / 9783540262039 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich