Bültmann & Gerriets
Privacy Enhancing Technologies
8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings
von Ian Goldberg, Nikita Borisov
Verlag: Springer Berlin Heidelberg
Reihe: Security and Cryptology Nr. 5134
Hardcover
ISBN: 978-3-540-70629-8
Auflage: 2008
Erschienen am 14.07.2008
Sprache: Englisch
Format: 235 mm [H] x 155 mm [B] x 14 mm [T]
Gewicht: 388 Gramm
Umfang: 252 Seiten

Preis: 53,49 €
keine Versandkosten (Inland)


Dieser Titel wird erst bei Bestellung gedruckt. Eintreffen bei uns daher ca. am 28. September.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

53,49 €
merken
zum E-Book (PDF) 53,49 €
klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Klappentext
Inhaltsverzeichnis

The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23¿25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a premier venue for publishing original research on privacy-enhancing technologies. PETS received 48 submissions, each of which wasreviewedbyatleastfourmembersoftheProgramCommittee.Thirteenwere accepted into the program, maintaining the selective and competitive nature of the event. The program also included a keynote address by Stuart Shapiro. A new feature this year was the HotPETs session, designed to balance the desire for rigorous scienti?c quality of the PETS program and the need for a venue to present work that is not yet fully developed. HotPETs accepted s- missions on the hottest, most exciting new ideas and put together an excellent program of presentations. PETS was once again collocated with the IAVoSS Workshop on Trustworthy Elections (WOTE 2008), with a full day of plenary sessions. In addition, three otherprivacy-relatedeventswereheldatK.U.Leuvenduring thesameweek,- abling greater exchange of ideas among the respective communities: the closing event of the Privacy and Identity Management for Europe (PRIME) project, a workshop presenting the results from the Advanced Applications for Electronic Identity Cards (ADAPID) project, and a working session of the Future of Id- tity in the Information Society (FIDIS) Workpackage 13.



Analyzing PETs for Enterprise Operations.- Perfect Matching Disclosure Attacks.- An Indistinguishability-Based Characterization of Anonymous Channels.- On the Impact of Social Network Profiling on Anonymity.- Shining Light in Dark Places: Understanding the Tor Network.- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover.- Breaking and Provably Fixing Minx.- Metrics for Security and Performance in Low-Latency Anonymity Systems.- Studying Timing Analysis on the Internet with SubRosa.- Bridging and Fingerprinting: Epistemic Attacks on Route Selection.- Chattering Laptops.- How to Bypass Two Anonymity Revocation Schemes.- Reputation Systems for Anonymous Networks.- PAR: Payment for Anonymous Routing.


andere Formate
weitere Titel der Reihe