Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings: Lecture Notes in Computer Science, cartea 7981
Editat de Emiliano De Cristofaro, Matthew Wrighten Limba Engleză Paperback – 19 iul 2013
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 353.79 lei
Nou
Puncte Express: 531
Preț estimativ în valută:
67.71€ • 70.50$ • 57.22£
67.71€ • 70.50$ • 57.22£
Carte tipărită la comandă
Livrare economică 07-21 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642390760
ISBN-10: 3642390765
Pagini: 276
Ilustrații: X, 265 p. 88 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.39 kg
Ediția:2013
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642390765
Pagini: 276
Ilustrații: X, 265 p. 88 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.39 kg
Ediția:2013
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Optimizing ORAM and Using It Efficiently for Secure Computation.- Anonymity-Preserving Public-Key Encryption: A Constructive Approach.- Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.- Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error.- Broadening the Scope of Differential Privacy Using Metrics.- Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.- How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.- The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting.- How Low Can You Go: Balancing Performance with Anonymity in Tor.- OSS: Using Online Scanning Services for Censorship Circumvention.- The Need for Flow Fingerprints to Link Correlated Network Flows.- How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.- On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.
Textul de pe ultima copertă
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
Caracteristici
Fast track conference proceedings Unique visibility State of the art research