Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers / [electronic resource] :
edited by Nikita Borisov, Philippe Golle.
- 1st ed. 2007.
- X, 278 p. online resource.
- Security and Cryptology, 4776 2946-1863 ; .
- Security and Cryptology, 4776 .
Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.
9783540755517
10.1007/978-3-540-75551-7 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824
Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.
9783540755517
10.1007/978-3-540-75551-7 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824