1 option
Privacy Enhancing Technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers / edited by David Martin, Andrei Serjantov.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 3424.
- Security and Cryptology ; 3424
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer networks.
- Operating systems (Computers).
- Management information systems.
- Computer science.
- Computers and civilization.
- Information storage and retrieval.
- Cryptology.
- Computer Communication Networks.
- Operating Systems.
- Management of Computing and Information Systems.
- Computers and Society.
- Information Storage and Retrieval.
- Local Subjects:
- Cryptology.
- Computer Communication Networks.
- Operating Systems.
- Management of Computing and Information Systems.
- Computers and Society.
- Information Storage and Retrieval.
- Physical Description:
- 1 online resource (VIII, 345 pages).
- Edition:
- First edition 2005.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
- System Details:
- text file PDF
- Contents:
- Anonymity and Covert Channels in Simple Timed Mix-Firewalls
- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
- The Traffic Analysis of Continuous-Time Mixes
- Reputable Mix Networks
- Secure Outsourcing of Sequence Comparisons
- An Improved Construction for Universal Re-encryption
- Electromagnetic Eavesdropping Risks of Flat-Panel Displays
- On the Anonymity of Banknotes
- FLASCHE - A Mechanism Providing Anonymity for Mobile Users
- Cryptographically Protected Prefixes for Location Privacy in IPv6
- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
- Synchronous Batching: From Cascades to Free Routes
- On Flow Correlation Attacks and Countermeasures in Mix Networks
- Measuring Anonymity in a Non-adaptive, Real-Time System
- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?"
- A Formal Privacy System and Its Application to Location Based Services
- Privacy-Preserving Trust Negotiations
- Language-Based Enforcement of Privacy Policies
- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior
- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-31960-3
- 9783540319603
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.