Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers

Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers

Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers

Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers

Paperback(2003)

$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002. The 17 revised full papers presented were carefully selected during two rounds of reviewing and improvement. Among the topics addressed are Internet security, private authentication, information theoretic anonymity, anonymity measuring, enterprise privacy practices, service architectures for privacy, intersection attacks, online trust negotiation, random data perturbation, Website fingerprinting, Web user privacy, TCP timestamps, private information retrieval, and unobservable Web surfing.


Product Details

ISBN-13: 9783540005650
Publisher: Springer Berlin Heidelberg
Publication date: 04/10/2003
Series: Lecture Notes in Computer Science , #2482
Edition description: 2003
Pages: 242
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Privacy-Enhancing Technologies for the Internet, II: Five Years Later.- Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education.- Private Authentication.- Towards an Information Theoretic Metric for Anonymity.- Towards Measuring Anonymity.- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.- Privacy Enhancing Profile Disclosure.- Privacy Enhancing Service Architectures.- Dummy Traffic against Long Term Intersection Attacks.- Protecting Privacy during On-Line Trust Negotiation.- Prototyping an Armored Data Vault.- Preventing Interval-Based Inference by Random Data Perturbation.- Fingerprinting Websites Using Traffic Analysis.- A Passive Attack on the Privacy of Web Users Using Standard Log Information.- Covert Messaging through TCP Timestamps.- Almost Optimal Private Information Retrieval.- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?.
From the B&N Reads Blog

Customer Reviews