Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers / Edition 1

Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers / Edition 1

by George Danezis
     
 

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing

See more details below

Overview

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.

Product Details

ISBN-13:
9783540347453
Publisher:
Springer Berlin Heidelberg
Publication date:
07/28/2006
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #3856
Edition description:
2006
Pages:
276
Product dimensions:
0.60(w) x 6.14(h) x 9.21(d)

Table of Contents

Privacy Vulnerabilities in Encrypted HTTP Streams.- An Analysis of Parallel Mixing with Attacker-Controlled Inputs.- Message Splitting Against the Partial Adversary.- Location Privacy for Cellular Systems; Analysis and Solution.- Towards Modeling Wireless Location Privacy.- Failures in a Hybrid Content Blocking System.- Anonymity Preserving Techniques in Trust Negotiations.- Unmixing Mix Traffic.- Mix-Network with Stronger Security.- Covert Channels in IPv6.- Towards Privacy-Aware eLearning.- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.- Privacy Issues in Vehicular Ad Hoc Networks.- High-Power Proxies for Enhancing RFID Privacy and Utility.- Integrating Utility into Face De-identification.- Privacy in India: Attitudes and Awareness.- Economics of Identity Management: A Supply-Side Perspective.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >