
Parameter
Mehr zum Buch
InhaltsverzeichnisAnonymity and Covert Channels in Simple Timed Mix-Firewalls.Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.The Traffic Analysis of Continuous-Time Mixes.Reputable Mix Networks.Secure Outsourcing of Sequence Comparisons.An Improved Construction for Universal Re-encryption.Electromagnetic Eavesdropping Risks of Flat-Panel Displays.On the Anonymity of Banknotes.FLASCHE – A Mechanism Providing Anonymity for Mobile Users.Cryptographically Protected Prefixes for Location Privacy in IPv6.Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.Synchronous Batching: From Cascades to Free Routes.On Flow Correlation Attacks and Countermeasures in Mix Networks.Measuring Anonymity in a Non-adaptive, Real-Time System.Panel Discussion — Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?.On the PET Workshop Panel “Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?”.A Formal Privacy System and Its Application to Location Based Services.Privacy-Preserving Trust Negotiations.Language-Based Enforcement of Privacy Policies.Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior.Panel Discussion — Conforming Technology to Policy: The Problems of Electronic Health Records.
Buchkauf
Privacy enhancing technologies, David Martin
- Sprache
- Erscheinungsdatum
- 2005
Lieferung
Zahlungsmethoden
Feedback senden
- Titel
- Privacy enhancing technologies
- Sprache
- Englisch
- Autor*innen
- David Martin
- Verlag
- Springer
- Erscheinungsdatum
- 2005
- ISBN10
- 3540262032
- ISBN13
- 9783540262039
- Kategorie
- Informatik & Programmierung
- Beschreibung
- InhaltsverzeichnisAnonymity and Covert Channels in Simple Timed Mix-Firewalls.Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.The Traffic Analysis of Continuous-Time Mixes.Reputable Mix Networks.Secure Outsourcing of Sequence Comparisons.An Improved Construction for Universal Re-encryption.Electromagnetic Eavesdropping Risks of Flat-Panel Displays.On the Anonymity of Banknotes.FLASCHE – A Mechanism Providing Anonymity for Mobile Users.Cryptographically Protected Prefixes for Location Privacy in IPv6.Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.Synchronous Batching: From Cascades to Free Routes.On Flow Correlation Attacks and Countermeasures in Mix Networks.Measuring Anonymity in a Non-adaptive, Real-Time System.Panel Discussion — Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?.On the PET Workshop Panel “Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?”.A Formal Privacy System and Its Application to Location Based Services.Privacy-Preserving Trust Negotiations.Language-Based Enforcement of Privacy Policies.Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior.Panel Discussion — Conforming Technology to Policy: The Problems of Electronic Health Records.