Cantitate/Preț
Produs

Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4258

Editat de George Danezis, Philippe Golle
en Limba Engleză Paperback – 14 dec 2006

Din seria Lecture Notes in Computer Science

Preț: 39678 lei

Nou

Puncte Express: 595

Preț estimativ în valută:
7593 7834$ 6427£

Carte tipărită la comandă

Livrare economică 05-19 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540687900
ISBN-10: 3540687904
Pagini: 448
Ilustrații: VIII, 434 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.62 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

6th Workshop on Privacy Enhancing Technologies.- Privacy for Public Transportation.- Ignoring the Great Firewall of China.- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.- Privacy Injector — Automated Privacy Enforcement Through Aspects.- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises.- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.- Protecting Privacy with the MPEG-21 IPMP Framework.- Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement.- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing.- Selectively Traceable Anonymity.- Valet Services: Improving Hidden Servers with a Personal Touch.- Blending Different Latency Traffic with Alpha-mixing.- Private Resource Pairing.- Honest-Verifier Private Disjointness Testing Without Random Oracles.- A Flexible Framework for Secret Handshakes.- On the Security of the Tor Authentication Protocol.- Optimal Key-Trees for Tree-Based Private Authentication.- Simple and Flexible Revocation Checking with Privacy.- Breaking the Collusion Detection Mechanism of MorphMix.- Linking Anonymous Transactions: The Consistent View Attack.- Preserving User Location Privacy in Mobile Data Management Infrastructures.- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.