Amazon cover image
Image from Amazon.com
Image from Google Jackets

Privacy Enhancing Technologies [electronic resource] : 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers / edited by Nikita Borisov, Philippe Golle.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 4776Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: X, 278 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540755517
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services — Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK7875

Attacking Unlinkability: The Importance of Context -- A Fresh Look at the Generalised Mix Framework -- Two-Sided Statistical Disclosure Attack -- A Family of Dunces: Trivial RFID Identification and Authentication Protocols -- Louis, Lester and Pierre: Three Protocols for Location Privacy -- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker -- Pairing-Based Onion Routing -- Nymble: Anonymous IP-Address Blocking -- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services -- Identity Trail: Covert Surveillance Using DNS -- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries -- Browser-Based Attacks on Tor -- Enforcing P3P Policies Using a Digital Rights Management System -- Simplified Privacy Controls for Aggregated Services — Suspend and Resume of Personal Data -- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective -- Anonymity in the Wild: Mixes on Unstructured Networks.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India