Privacy Enhancing Technologies
Springer Berlin (Verlag)
978-3-540-70629-8 (ISBN)
This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.
The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
Analyzing PETs for Enterprise Operations.- Perfect Matching Disclosure Attacks.- An Indistinguishability-Based Characterization of Anonymous Channels.- On the Impact of Social Network Profiling on Anonymity.- Shining Light in Dark Places: Understanding the Tor Network.- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover.- Breaking and Provably Fixing Minx.- Metrics for Security and Performance in Low-Latency Anonymity Systems.- Studying Timing Analysis on the Internet with SubRosa.- Bridging and Fingerprinting: Epistemic Attacks on Route Selection.- Chattering Laptops.- How to Bypass Two Anonymity Revocation Schemes.- Reputation Systems for Anonymous Networks.- PAR: Payment for Anonymous Routing.
Erscheint lt. Verlag | 14.7.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 237 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 391 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • anonymity • authentication • Censorship • Certification • content filtering • credential systems • fielded systems • Firewall • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity Management • Key Management • location privacy • Network Security • obligation management • P • P2P Systems • privacy • privacy preservation • RFID security • secret handshakes • security attacks • sender anonymity • Social Networks • traffic analysis • trust negotiation |
ISBN-10 | 3-540-70629-1 / 3540706291 |
ISBN-13 | 978-3-540-70629-8 / 9783540706298 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich