Normal view MARC view ISBD view

Privacy Enhancing Technologies [electronic resource] : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings / edited by Nikita Borisov, Ian Goldberg.

Contributor(s): Borisov, Nikita [editor.] | Goldberg, Ian [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 5134Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008Edition: 1st ed. 2008.Description: X, 237 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540706304.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks  | Data protection | Information storage and retrieval systems | Computers and civilization | Electronic data processing -- Management | Cryptology | Computer Communication Networks | Data and Information Security | Information Storage and Retrieval | Computers and Society | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Analyzing PETs for Enterprise Operations -- Perfect Matching Disclosure Attacks -- An Indistinguishability-Based Characterization of Anonymous Channels -- On the Impact of Social Network Profiling on Anonymity -- Shining Light in Dark Places: Understanding the Tor Network -- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover -- Breaking and Provably Fixing Minx -- Metrics for Security and Performance in Low-Latency Anonymity Systems -- Studying Timing Analysis on the Internet with SubRosa -- Bridging and Fingerprinting: Epistemic Attacks on Route Selection -- Chattering Laptops -- How to Bypass Two Anonymity Revocation Schemes -- Reputation Systems for Anonymous Networks -- PAR: Payment for Anonymous Routing.
In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. .
    average rating: 0.0 (0 votes)
No physical items for this record

Analyzing PETs for Enterprise Operations -- Perfect Matching Disclosure Attacks -- An Indistinguishability-Based Characterization of Anonymous Channels -- On the Impact of Social Network Profiling on Anonymity -- Shining Light in Dark Places: Understanding the Tor Network -- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover -- Breaking and Provably Fixing Minx -- Metrics for Security and Performance in Low-Latency Anonymity Systems -- Studying Timing Analysis on the Internet with SubRosa -- Bridging and Fingerprinting: Epistemic Attacks on Route Selection -- Chattering Laptops -- How to Bypass Two Anonymity Revocation Schemes -- Reputation Systems for Anonymous Networks -- PAR: Payment for Anonymous Routing.

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. .

There are no comments for this item.

Log in to your account to post a comment.