000 | 03053nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-31680-7 | ||
003 | DE-He213 | ||
005 | 20240730164158.0 | ||
007 | cr nn 008mamaa | ||
008 | 120627s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642316807 _9978-3-642-31680-7 |
||
024 | 7 |
_a10.1007/978-3-642-31680-7 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPrivacy Enhancing Technologies _h[electronic resource] : _b12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / _cedited by Simone Fischer-Hübner, Matthew Wright. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aX, 319 p. 89 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7384 |
|
520 | _aThis book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012. The 16 full papers presented were carefully selected from 72 submissions. Topics addressed include anonymization of statistics, content, and traffic, network traffic analysis, censorship-resistant systems, user profiling, training users in privacy risk management, and privacy of internet and cloud-bases services. A further highlight is the HotPETS session, designed as a venue to present existing but still preliminary and evolving ideas. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic data processing _xManagement. _982626 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _982629 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aFischer-Hübner, Simone. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _982631 |
|
700 | 1 |
_aWright, Matthew. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _982632 |
|
710 | 2 |
_aSpringerLink (Online service) _982634 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642316791 |
776 | 0 | 8 |
_iPrinted edition: _z9783642316814 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7384 _982635 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-31680-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c85383 _d85383 |