Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers / [electronic resource] :
edited by David Martin, Andrei Serjantov.
- 1st ed. 2005.
- VIII, 345 p. online resource.
- Security and Cryptology, 3424 2946-1863 ; .
- Security and Cryptology, 3424 .
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity of Banknotes -- FLASCHE - A Mechanism Providing Anonymity for Mobile Users -- Cryptographically Protected Prefixes for Location Privacy in IPv6 -- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments -- Synchronous Batching: From Cascades to Free Routes -- On Flow Correlation Attacks and Countermeasures in Mix Networks -- Measuring Anonymity in a Non-adaptive, Real-Time System -- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? -- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" -- A Formal Privacy System and Its Application to Location Based Services -- Privacy-Preserving Trust Negotiations -- Language-Based Enforcement of Privacy Policies -- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine -- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior -- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
9783540319603
10.1007/b136164 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
Electronic data processing--Management.
Computers and civilization.
Information storage and retrieval systems.
Cryptology.
Computer Communication Networks.
Operating Systems.
IT Operations.
Computers and Society.
Information Storage and Retrieval.
QA268
005.824
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity of Banknotes -- FLASCHE - A Mechanism Providing Anonymity for Mobile Users -- Cryptographically Protected Prefixes for Location Privacy in IPv6 -- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments -- Synchronous Batching: From Cascades to Free Routes -- On Flow Correlation Attacks and Countermeasures in Mix Networks -- Measuring Anonymity in a Non-adaptive, Real-Time System -- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? -- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" -- A Formal Privacy System and Its Application to Location Based Services -- Privacy-Preserving Trust Negotiations -- Language-Based Enforcement of Privacy Policies -- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine -- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior -- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
9783540319603
10.1007/b136164 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
Electronic data processing--Management.
Computers and civilization.
Information storage and retrieval systems.
Cryptology.
Computer Communication Networks.
Operating Systems.
IT Operations.
Computers and Society.
Information Storage and Retrieval.
QA268
005.824