Privacy Enhancing Technologies
Springer Berlin (Verlag)
978-3-540-68790-0 (ISBN)
6th Workshop on Privacy Enhancing Technologies.- Privacy for Public Transportation.- Ignoring the Great Firewall of China.- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.- Privacy Injector - Automated Privacy Enforcement Through Aspects.- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises.- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.- Protecting Privacy with the MPEG-21 IPMP Framework.- Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement.- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing.- Selectively Traceable Anonymity.- Valet Services: Improving Hidden Servers with a Personal Touch.- Blending Different Latency Traffic with Alpha-mixing.- Private Resource Pairing.- Honest-Verifier Private Disjointness Testing Without Random Oracles.- A Flexible Framework for Secret Handshakes.- On the Security of the Tor Authentication Protocol.- Optimal Key-Trees for Tree-Based Private Authentication.- Simple and Flexible Revocation Checking with Privacy.- Breaking the Collusion Detection Mechanism of MorphMix.- Linking Anonymous Transactions: The Consistent View Attack.- Preserving User Location Privacy in Mobile Data Management Infrastructures.- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.
Erscheint lt. Verlag | 14.12.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VIII, 434 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 626 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • anonymity • Bridge • Censorship • content filtering • credential systems • Data Security • Firewall • indentity management • Information • Key Management • lacation privacy • Network Security • obligation management • P2P Systems • privacy • privacy preservation • RFID security • secret hand • secret handshakes • security • security attacks • sender anonymity • Social Networks • Trust • trust negotiation |
ISBN-10 | 3-540-68790-4 / 3540687904 |
ISBN-13 | 978-3-540-68790-0 / 9783540687900 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich