Sold Out
Book Categories |
Privacy-Enhancing Technologies for the Internet, II: Five Years Later | 1 | |
Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education | 13 | |
Private Authentication | 27 | |
Towards an Information Theoretic Metric for Anonymity | 41 | |
Towards Measuring Anonymity | 54 | |
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data | 69 | |
Privacy Enhancing Profile Disclosure | 85 | |
Privacy Enhancing Service Architectures | 99 | |
Dummy Traffic against Long Term Intersection Attacks | 110 | |
Protecting Privacy during On-Line Trust Negotiation | 129 | |
Prototyping an Armored Data Vault | 144 | |
Preventing Interval-Based Inference by Random Data Perturbation | 160 | |
Fingerprinting Websites Using Traffic Analysis | 171 | |
A Passive Attack on the Privacy of Web Users Using Standard Log Information | 179 | |
Covert Messaging through TCP Timestamps | 194 | |
Almost Optimal Private Information Retrieval | 209 | |
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? | 224 | |
Author Index | 239 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionPrivacy Enhancing Technologies
X
This Item is in Your InventoryPrivacy Enhancing Technologies
X
You must be logged in to review the productsX
X
X
Add Privacy Enhancing Technologies, , Privacy Enhancing Technologies to the inventory that you are selling on WonderClubX
X
Add Privacy Enhancing Technologies, , Privacy Enhancing Technologies to your collection on WonderClub |