LEADER 04271nam 22007815 450 001 996465739803316 005 20200704075342.0 010 $a3-540-75551-9 024 7 $a10.1007/978-3-540-75551-7 035 $a(CKB)1000000000490883 035 $a(SSID)ssj0000319551 035 $a(PQKBManifestationID)11250112 035 $a(PQKBTitleCode)TC0000319551 035 $a(PQKBWorkID)10339085 035 $a(PQKB)11639426 035 $a(DE-He213)978-3-540-75551-7 035 $a(MiAaPQ)EBC3068630 035 $a(PPN)123728622 035 $a(EXLCZ)991000000000490883 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy Enhancing Technologies$b[electronic resource] $e7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers /$fedited by Nikita Borisov, Philippe Golle 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (X, 278 p.) 225 1 $aSecurity and Cryptology ;$v4776 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-75550-0 320 $aIncludes bibliographical references and index. 327 $aAttacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services ? Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks. 410 0$aSecurity and Cryptology ;$v4776 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aInformation storage and retrieval 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aBorisov$b Nikita$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGolle$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465739803316 996 $aPrivacy Enhancing Technologies$9772515 997 $aUNISA