Privacy Enhancing Technologies: 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Privacy Enhancing Technologies, PET 2004, held in Toronto, Canada in May 2004.

The 20 revised full papers presented were carefully selected from 68 submissions during two rounds of reviewing and improvement. Among the topics addressed are mix networks, mix firewalls, traffic analysis, sequence analysis, re-encryption, electromagnetic eavesdropping, anonymity of banknotes, IPv6, trustworthy environments, flow correlation attacks, anonymity measuring, mix cascades, trust negotiation, privacy policies, and personalization.

Author(s): Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz (auth.), David Martin, Andrei Serjantov (eds.)
Series: Lecture Notes in Computer Science 3424 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 345
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Computers and Society; Information Storage and Retrieval

Front Matter....Pages -
Anonymity and Covert Channels in Simple Timed Mix-Firewalls....Pages 1-16
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure....Pages 17-34
The Traffic Analysis of Continuous-Time Mixes....Pages 35-50
Reputable Mix Networks....Pages 51-62
Secure Outsourcing of Sequence Comparisons....Pages 63-78
An Improved Construction for Universal Re-encryption....Pages 79-87
Electromagnetic Eavesdropping Risks of Flat-Panel Displays....Pages 88-107
On the Anonymity of Banknotes....Pages 108-120
FLASCHE – A Mechanism Providing Anonymity for Mobile Users....Pages 121-141
Cryptographically Protected Prefixes for Location Privacy in IPv6....Pages 142-166
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments....Pages 167-185
Synchronous Batching: From Cascades to Free Routes....Pages 186-206
On Flow Correlation Attacks and Countermeasures in Mix Networks....Pages 207-225
Measuring Anonymity in a Non-adaptive, Real-Time System....Pages 226-241
Panel Discussion — Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?....Pages 242-242
On the PET Workshop Panel “Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?”....Pages 243-255
A Formal Privacy System and Its Application to Location Based Services....Pages 256-282
Privacy-Preserving Trust Negotiations....Pages 283-301
Language-Based Enforcement of Privacy Policies....Pages 302-313
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine....Pages 314-328
Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior....Pages 329-343
Panel Discussion — Conforming Technology to Policy: The Problems of Electronic Health Records....Pages 344-344
Back Matter....Pages -