Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Privacy Enhancing Technologies

8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Nikita Borisov, Ian Goldberg (Herausgeber)

Buch | Softcover
X, 237 Seiten
2008 | 2008
Springer Berlin (Verlag)
978-3-540-70629-8 (ISBN)
CHF 97,35 inkl. MwSt

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.

The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

 

Analyzing PETs for Enterprise Operations.- Perfect Matching Disclosure Attacks.- An Indistinguishability-Based Characterization of Anonymous Channels.- On the Impact of Social Network Profiling on Anonymity.- Shining Light in Dark Places: Understanding the Tor Network.- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover.- Breaking and Provably Fixing Minx.- Metrics for Security and Performance in Low-Latency Anonymity Systems.- Studying Timing Analysis on the Internet with SubRosa.- Bridging and Fingerprinting: Epistemic Attacks on Route Selection.- Chattering Laptops.- How to Bypass Two Anonymity Revocation Schemes.- Reputation Systems for Anonymous Networks.- PAR: Payment for Anonymous Routing.

Erscheint lt. Verlag 14.7.2008
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 237 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 391 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • anonymity • authentication • Censorship • Certification • content filtering • credential systems • fielded systems • Firewall • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity Management • Key Management • location privacy • Network Security • obligation management • P • P2P Systems • privacy • privacy preservation • RFID security • secret handshakes • security attacks • sender anonymity • Social Networks • traffic analysis • trust negotiation
ISBN-10 3-540-70629-1 / 3540706291
ISBN-13 978-3-540-70629-8 / 9783540706298
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich