> Detailanzeige
Danezis, George
[Sonstige Person, Familie und Körperschaft];
Golle, Philippe
[Sonstige Person, Familie und Körperschaft]
Privacy Enhancing Technologies (vol. # 4258)
Teilen
Literatur-
verwaltung
Direktlink
Zur
Merkliste
Lösche von
Merkliste
Per Email teilen
Auf Twitter teilen
Auf Facebook teilen
Per Whatsapp teilen
- Medientyp: E-Book; Konferenzbericht
- Titel: Privacy Enhancing Technologies (vol. # 4258) : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
- Beteiligte: Danezis, George [Sonstige Person, Familie und Körperschaft]; Golle, Philippe [Sonstige Person, Familie und Körperschaft]
-
Erschienen:
Berlin, Heidelberg: Springer Berlin Heidelberg, 2006
-
Erschienen in:
Lecture notes in computer science ; 4258
Bücher - Umfang: Online-Ressource (VIII, 431p. Also available online, digital)
- Sprache: Englisch
- DOI: 10.1007/11957454
- ISBN: 9783540687931
- Identifikator:
-
RVK-Notation:
SS 4800 : Lecture notes in computer science
-
Schlagwörter:
Internet
>
Privatsphäre
>
Anonymität
>
Computersicherheit
Internet > Privatsphäre > Anonymität > Datensicherung
Netzwerkverwaltung > Anonymität > Authentifikation > Kryptoanalyse
- Entstehung:
- Anmerkungen:
- Beschreibung: 6th Workshop on Privacy Enhancing Technologies -- Privacy for Public Transportation -- Ignoring the Great Firewall of China -- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook -- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks -- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management -- Privacy Injector — Automated Privacy Enforcement Through Aspects -- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises -- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique -- Protecting Privacy with the MPEG-21 IPMP Framework -- Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement -- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing -- Selectively Traceable Anonymity -- Valet Services: Improving Hidden Servers with a Personal Touch -- Blending Different Latency Traffic with Alpha-mixing -- Private Resource Pairing -- Honest-Verifier Private Disjointness Testing Without Random Oracles -- A Flexible Framework for Secret Handshakes -- On the Security of the Tor Authentication Protocol -- Optimal Key-Trees for Tree-Based Private Authentication -- Simple and Flexible Revocation Checking with Privacy -- Breaking the Collusion Detection Mechanism of MorphMix -- Linking Anonymous Transactions: The Consistent View Attack -- Preserving User Location Privacy in Mobile Data Management Infrastructures -- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.