Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers / [electronic resource] :
edited by George Danezis, Philippe Golle.
- 1st ed. 2006.
- VIII, 434 p. online resource.
- Security and Cryptology, 4258 2946-1863 ; .
- Security and Cryptology, 4258 .
6th Workshop on Privacy Enhancing Technologies -- Privacy for Public Transportation -- Ignoring the Great Firewall of China -- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook -- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks -- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management -- Privacy Injector - Automated Privacy Enforcement Through Aspects -- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises -- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique -- Protecting Privacy with the MPEG-21 IPMP Framework -- Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement -- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing -- Selectively Traceable Anonymity -- Valet Services: Improving Hidden Servers with a Personal Touch -- Blending Different Latency Traffic with Alpha-mixing -- Private Resource Pairing -- Honest-Verifier Private Disjointness Testing Without Random Oracles -- A Flexible Framework for Secret Handshakes -- On the Security of the Tor Authentication Protocol -- Optimal Key-Trees for Tree-Based Private Authentication -- Simple and Flexible Revocation Checking with Privacy -- Breaking the Collusion Detection Mechanism of MorphMix -- Linking Anonymous Transactions: The Consistent View Attack -- Preserving User Location Privacy in Mobile Data Management Infrastructures -- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.
9783540687931
10.1007/11957454 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824
6th Workshop on Privacy Enhancing Technologies -- Privacy for Public Transportation -- Ignoring the Great Firewall of China -- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook -- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks -- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management -- Privacy Injector - Automated Privacy Enforcement Through Aspects -- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises -- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique -- Protecting Privacy with the MPEG-21 IPMP Framework -- Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement -- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing -- Selectively Traceable Anonymity -- Valet Services: Improving Hidden Servers with a Personal Touch -- Blending Different Latency Traffic with Alpha-mixing -- Private Resource Pairing -- Honest-Verifier Private Disjointness Testing Without Random Oracles -- A Flexible Framework for Secret Handshakes -- On the Security of the Tor Authentication Protocol -- Optimal Key-Trees for Tree-Based Private Authentication -- Simple and Flexible Revocation Checking with Privacy -- Breaking the Collusion Detection Mechanism of MorphMix -- Linking Anonymous Transactions: The Consistent View Attack -- Preserving User Location Privacy in Mobile Data Management Infrastructures -- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.
9783540687931
10.1007/11957454 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824