Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Danezis, George (Επιμελητής έκδοσης), Golle, Philippe (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4258
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • 6th Workshop on Privacy Enhancing Technologies
  • Privacy for Public Transportation
  • Ignoring the Great Firewall of China
  • Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
  • Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks
  • Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
  • Privacy Injector — Automated Privacy Enforcement Through Aspects
  • A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises
  • One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique
  • Protecting Privacy with the MPEG-21 IPMP Framework
  • Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement
  • Improving Sender Anonymity in a Structured Overlay with Imprecise Routing
  • Selectively Traceable Anonymity
  • Valet Services: Improving Hidden Servers with a Personal Touch
  • Blending Different Latency Traffic with Alpha-mixing
  • Private Resource Pairing
  • Honest-Verifier Private Disjointness Testing Without Random Oracles
  • A Flexible Framework for Secret Handshakes
  • On the Security of the Tor Authentication Protocol
  • Optimal Key-Trees for Tree-Based Private Authentication
  • Simple and Flexible Revocation Checking with Privacy
  • Breaking the Collusion Detection Mechanism of MorphMix
  • Linking Anonymous Transactions: The Consistent View Attack
  • Preserving User Location Privacy in Mobile Data Management Infrastructures
  • The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.