Muutke küpsiste eelistusi

Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers 2006 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 276 pages, kõrgus x laius: 233x155 mm, kaal: 900 g, VIII, 276 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 3856
  • Ilmumisaeg: 27-Jun-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540347453
  • ISBN-13: 9783540347453
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 276 pages, kõrgus x laius: 233x155 mm, kaal: 900 g, VIII, 276 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 3856
  • Ilmumisaeg: 27-Jun-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540347453
  • ISBN-13: 9783540347453
Teised raamatud teemal:

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.



This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.
Privacy Vulnerabilities in Encrypted HTTP Streams.- An Analysis of Parallel Mixing with Attacker-Controlled Inputs.- Message Splitting Against the Partial Adversary.- Location Privacy for Cellular Systems; Analysis and Solution.- Towards Modeling Wireless Location Privacy.- Failures in a Hybrid Content Blocking System.- Anonymity Preserving Techniques in Trust Negotiations.- Unmixing Mix Traffic.- Mix-Network with Stronger Security.- Covert Channels in IPv6.- Towards Privacy-Aware eLearning.- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.- Privacy Issues in Vehicular Ad Hoc Networks.- High-Power Proxies for Enhancing RFID Privacy and Utility.- Integrating Utility into Face De-identification.- Privacy in India: Attitudes and Awareness.- Economics of Identity Management: A Supply-Side Perspective.