My Account Log in

1 option

Privacy Enhancing Technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers / edited by David Martin, Andrei Serjantov.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Martin, David (David Michael), editor.
Serjantov, Andrei, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 3424.
Security and Cryptology ; 3424
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Operating systems (Computers).
Management information systems.
Computer science.
Computers and civilization.
Information storage and retrieval.
Cryptology.
Computer Communication Networks.
Operating Systems.
Management of Computing and Information Systems.
Computers and Society.
Information Storage and Retrieval.
Local Subjects:
Cryptology.
Computer Communication Networks.
Operating Systems.
Management of Computing and Information Systems.
Computers and Society.
Information Storage and Retrieval.
Physical Description:
1 online resource (VIII, 345 pages).
Edition:
First edition 2005.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
System Details:
text file PDF
Contents:
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
The Traffic Analysis of Continuous-Time Mixes
Reputable Mix Networks
Secure Outsourcing of Sequence Comparisons
An Improved Construction for Universal Re-encryption
Electromagnetic Eavesdropping Risks of Flat-Panel Displays
On the Anonymity of Banknotes
FLASCHE - A Mechanism Providing Anonymity for Mobile Users
Cryptographically Protected Prefixes for Location Privacy in IPv6
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Synchronous Batching: From Cascades to Free Routes
On Flow Correlation Attacks and Countermeasures in Mix Networks
Measuring Anonymity in a Non-adaptive, Real-Time System
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?"
A Formal Privacy System and Its Application to Location Based Services
Privacy-Preserving Trust Negotiations
Language-Based Enforcement of Privacy Policies
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior
Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
Other Format:
Printed edition:
ISBN:
978-3-540-31960-3
9783540319603
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account