1 option
Designing Privacy Enhancing Technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings / edited by Hannes Federrath.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 2009.
- Lecture Notes in Computer Science, 0302-9743 ; 2009
- Language:
- English
- Subjects (All):
- Computer networks.
- Data encryption (Computer science).
- Computer engineering.
- Operating systems (Computers).
- Management information systems.
- Computer science.
- Information storage and retrieval.
- Computer Communication Networks.
- Cryptology.
- Computer Engineering.
- Operating Systems.
- Management of Computing and Information Systems.
- Information Storage and Retrieval.
- Local Subjects:
- Computer Communication Networks.
- Cryptology.
- Computer Engineering.
- Operating Systems.
- Management of Computing and Information Systems.
- Information Storage and Retrieval.
- Physical Description:
- 1 online resource (X, 234 pages).
- Edition:
- First edition 2001.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
- System Details:
- text file PDF
- Summary:
- Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
- Contents:
- Terminology
- Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
- Attacks on Systems
- Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
- The Disadvantages of Free MIX Routes and How to Overcome Them
- Anonymous Publishing
- Freenet: A Distributed Anonymous Information Storage and Retrieval System
- The Free Haven Project: Distributed Anonymous Storage Service
- Mix Systems
- Towards an Analysis of Onion Routing Security
- Web MIXes: A System for Anonymous and Unobservable Internet Access
- Identity Management
- Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age
- Identity Management Based on P3P
- Pseudonyms and Remailers
- On Pseudonymization of Audit Data for Intrusion Detection
- Protection Profiles for Remailer Mixes.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-44702-3
- 9783540447023
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.