Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers

Author:   George Danezis ,  David Martin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2006 ed.
Volume:   3856
ISBN:  

9783540347453


Pages:   276
Publication Date:   27 June 2006
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $166.32 Quantity:  
Add to Cart

Share |

Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.

Full Product Details

Author:   George Danezis ,  David Martin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2006 ed.
Volume:   3856
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.30cm
Weight:   0.900kg
ISBN:  

9783540347453


ISBN 10:   3540347453
Pages:   276
Publication Date:   27 June 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Privacy Vulnerabilities in Encrypted HTTP Streams.- An Analysis of Parallel Mixing with Attacker-Controlled Inputs.- Message Splitting Against the Partial Adversary.- Location Privacy for Cellular Systems; Analysis and Solution.- Towards Modeling Wireless Location Privacy.- Failures in a Hybrid Content Blocking System.- Anonymity Preserving Techniques in Trust Negotiations.- Unmixing Mix Traffic.- Mix-Network with Stronger Security.- Covert Channels in IPv6.- Towards Privacy-Aware eLearning.- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.- Privacy Issues in Vehicular Ad Hoc Networks.- High-Power Proxies for Enhancing RFID Privacy and Utility.- Integrating Utility into Face De-identification.- Privacy in India: Attitudes and Awareness.- Economics of Identity Management: A Supply-Side Perspective.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List