Privacy Enhancing Technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings /

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Atallah, Mikhail J. (Επιμελητής έκδοσης), Hopper, Nicholas J. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6205
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03597nam a22005775i 4500
001 978-3-642-14527-8
003 DE-He213
005 20151204163607.0
007 cr nn 008mamaa
008 100707s2010 gw | s |||| 0|eng d
020 |a 9783642145278  |9 978-3-642-14527-8 
024 7 |a 10.1007/978-3-642-14527-8  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Privacy Enhancing Technologies  |h [electronic resource] :  |b 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings /  |c edited by Mikhail J. Atallah, Nicholas J. Hopper. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a X, 291 p. 51 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6205 
505 0 |a Privacy Enhancing Technologies Symposium -- How Unique Is Your Web Browser? -- On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot -- Private Information Disclosure from Web Searches -- Collaborative, Privacy-Preserving Data Aggregation at Scale -- Privacy-Preserving Queries over Relational Databases -- Achieving Efficient Query Privacy for Location Based Services -- Making a Nymbler Nymble Using VERBS -- Anonymous Webs of Trust -- Taming Big Brother Ambitions: More Privacy for Secret Handshakes -- Preventing Active Timing Attacks in Low-Latency Anonymous Communication -- Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks -- : An Architecture for Anonymous Low-Volume Communications -- Private Web Search with Malicious Adversaries -- unFriendly: Multi-party Privacy Risks in Social Networks -- The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures -- How to Share Your Favourite Search Results while Preserving Privacy and Quality. 
520 |a This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, network topology and web search with malicious adversaries. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers. 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Encryption. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Computers and Society. 
700 1 |a Atallah, Mikhail J.  |e editor. 
700 1 |a Hopper, Nicholas J.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642145261 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6205 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14527-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)