|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910143898903321 |
|
|
Titolo |
Privacy Enhancing Technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers / / edited by Roger Dingledine, Paul Syverson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2003.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VIII, 242 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2482 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Data encryption (Computer science) |
Computer engineering |
Operating systems (Computers) |
Information storage and retrieval |
Computers and civilization |
Computer Communication Networks |
Cryptology |
Computer Engineering |
Operating Systems |
Information Storage and Retrieval |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Privacy-Enhancing Technologies for the Internet, II: Five Years Later -- Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education -- Private Authentication -- Towards an Information Theoretic Metric for Anonymity -- Towards Measuring Anonymity -- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data -- Privacy Enhancing Profile Disclosure -- Privacy Enhancing Service Architectures -- Dummy Traffic against Long Term Intersection Attacks -- Protecting Privacy during On-Line Trust Negotiation -- Prototyping an Armored Data Vault -- Preventing Interval-Based |
|
|
|
|
|
|
|
|
|
|
Inference by Random Data Perturbation -- Fingerprinting Websites Using Traffic Analysis -- A Passive Attack on the Privacy of Web Users Using Standard Log Information -- Covert Messaging through TCP Timestamps -- Almost Optimal Private Information Retrieval -- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?. |
|
|
|
|
|
| |