Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers / [electronic resource] :
edited by George Danezis, David Martin.
- 1st ed. 2006.
- VIII, 276 p. online resource.
- Security and Cryptology, 3856 2946-1863 ; .
- Security and Cryptology, 3856 .
Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.
9783540347460
10.1007/11767831 doi
Cryptography. Data encryption (Computer science). Computer networks . Operating systems (Computers). Information storage and retrieval systems. Computers and civilization. Electronic data processing--Management. Cryptology. Computer Communication Networks. Operating Systems. Information Storage and Retrieval. Computers and Society. IT Operations.