Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers / [electronic resource] : edited by Nikita Borisov, Philippe Golle. - 1st ed. 2007. - X, 278 p. online resource. - Security and Cryptology, 4776 2946-1863 ; . - Security and Cryptology, 4776 .

Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.

9783540755517

10.1007/978-3-540-75551-7 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.

QA268

005.824