隐私增强技术:PET 2006 /会议论文选

隐私增强技术:PET 2006 /会议论文选
作 者: George Danezis 
出版社: 广东教育出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《隐私增强技术:PET 2006 /会议论文选》作者简介

内容简介

This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections.The 24 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing and improvement. The papers both from academia and industry present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

图书目录

6th Workshop on Privacy Enhancing Technologies

Privacy for Public Transportation

Ignoring the Great Firewall of China

Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook

Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management

Privacy Injector -- Automated Privacy Enforcement Through Aspects

A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises

One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique

Protecting Privacy with the MPEG-21 IPMP Framework

Personal Rights Management Taming Camera-Phones for Individual Privacy Enforcement

Improving Sender Anonymity in a Structured Overlay with Imprecise Routing

Selectively Traceable Anonymity

Valet Services: Imoroving Hidden Servers with a Personal Touch

Blending Different Latency Traffic with Alpha-mixing

Private Resource Pairing

Honest-Verifier Private Disjointness Testing Without Random Oracles

A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication)

On the Security of the Tor Authentication Protocol

Optimal Trees tor Tree-Based Private Authentication

Simple and Flexible Revocation Checking with Privacy

Breaking the Collusion Detection Mechanism of MorphMix

Linking Anonymous Transactions: The Consistent View Attack

Preserving User Location Privacy in Mobile Data Management Infrastructures

The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment

Author lndex