Sold Out
Book Categories |
Attacking Unlinkability: The Importance of Context Matthias Franz Bernd Meyer Andreas Pashalidis 1
A Fresh Look at the Generalised Mix Framework Andrei Serjantov 17
Two-Sided Statistical Disclosure Attack George Danezis Claudia Diaz Carmela Troncoso 30
A Family of Dunces: Trivial RFID Identification and Authentication Protocols Gene Tsudik 45
Louis, Lester and Pierre: Three Protocols for Location Privacy Ge Zhong Ian Goldberg Urs Hengartner 62
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker Markulf Kohlweiss Sebastian Faust Lothar Fritsch Bartek Gedrojc Bart Preneel 77
Pairing-Based Onion Routing Aniket Kate Greg Zaverucha Ian Goldberg 95
Nymble: Anonymous IP-Address Blocking Peter C. Johnson Apu Kapadia Patrick P. Tsang Sean W. Smith 113
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services Lasse Overlier Paul Syverson 134
Identity Trail: Covert Surveillance Using DNS Saikat Guha PaulFrancis 153
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries Steven J. Murdoch Piotr Zielinski 167
Browser-Based Attacks on Tor Timothy G. Abbott Katherine J. Lai Michael R. Lieberman Eric C. Price 184
Enforcing P3P Policies Using a Digital Rights Management System Farzad Salim Nicholas Paul Sheppard Rei Safavi-Naini 200
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data Matthias Schunter Michael Waidner 218
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective Rolf Wendolsky Dominik Herrmann Hannes Federrath 233
Anonymity in the Wild: Mixes on Unstructured Networks Shishir Nagaraja 254
Author Index 273
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionPrivacy Enhancing Technologies
X
This Item is in Your InventoryPrivacy Enhancing Technologies
X
You must be logged in to review the productsX
X
X
Add Privacy Enhancing Technologies, This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and re, Privacy Enhancing Technologies to the inventory that you are selling on WonderClubX
X
Add Privacy Enhancing Technologies, This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and re, Privacy Enhancing Technologies to your collection on WonderClub |