注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全隐私增强技术:PET 2006 /会议论文选

隐私增强技术:PET 2006 /会议论文选

隐私增强技术:PET 2006 /会议论文选

定 价:¥632.80

作 者: George Danezis 著
出版社: 广东教育出版社
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540687900 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections.The 24 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing and improvement. The papers both from academia and industry present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

作者简介

暂缺《隐私增强技术:PET 2006 /会议论文选》作者简介

图书目录

6th Workshop on Privacy Enhancing Technologies
Privacy for Public Transportation
Ignoring the Great Firewall of China
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
Privacy Injector -- Automated Privacy Enforcement Through Aspects
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique
Protecting Privacy with the MPEG-21 IPMP Framework
Personal Rights Management Taming Camera-Phones for Individual Privacy Enforcement
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing
Selectively Traceable Anonymity
Valet Services: Imoroving Hidden Servers with a Personal Touch
Blending Different Latency Traffic with Alpha-mixing
Private Resource Pairing
Honest-Verifier Private Disjointness Testing Without Random Oracles
A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication)
On the Security of the Tor Authentication Protocol
Optimal Trees tor Tree-Based Private Authentication
Simple and Flexible Revocation Checking with Privacy
Breaking the Collusion Detection Mechanism of MorphMix
Linking Anonymous Transactions: The Consistent View Attack
Preserving User Location Privacy in Mobile Data Management Infrastructures
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment
Author lndex

本目录推荐