Privacy Enhancing Technologies
Editat de George Danezis, Philippe Golleen Limba Engleză Paperback – 14 dec 2006
Preț: 328.72 lei
Preț vechi: 410.90 lei
-20% Nou
Puncte Express: 493
Preț estimativ în valută:
58.17€ • 68.21$ • 51.08£
58.17€ • 68.21$ • 51.08£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540687900
ISBN-10: 3540687904
Pagini: 448
Ilustrații: VIII, 434 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540687904
Pagini: 448
Ilustrații: VIII, 434 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
6th Workshop on Privacy Enhancing Technologies.- Privacy for Public Transportation.- Ignoring the Great Firewall of China.- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.- Privacy Injector — Automated Privacy Enforcement Through Aspects.- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises.- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.- Protecting Privacy with the MPEG-21 IPMP Framework.- Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement.- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing.- Selectively Traceable Anonymity.- Valet Services: Improving Hidden Servers with a Personal Touch.- Blending Different Latency Traffic with Alpha-mixing.- Private Resource Pairing.- Honest-Verifier Private Disjointness Testing Without Random Oracles.- A Flexible Framework for Secret Handshakes.- On the Security of the Tor Authentication Protocol.- Optimal Key-Trees for Tree-Based Private Authentication.- Simple and Flexible Revocation Checking with Privacy.- Breaking the Collusion Detection Mechanism of MorphMix.- Linking Anonymous Transactions: The Consistent View Attack.- Preserving User Location Privacy in Mobile Data Management Infrastructures.- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.