Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005.

The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.

Author(s): George Dean Bissias, Marc Liberatore, David Jensen (auth.), George Danezis, David Martin (eds.)
Series: Lecture Notes in Computer Science 3856 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 276
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Information Storage and Retrieval; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Privacy Vulnerabilities in Encrypted HTTP Streams....Pages 1-11
An Analysis of Parallel Mixing with Attacker-Controlled Inputs....Pages 12-25
Message Splitting Against the Partial Adversary....Pages 26-39
Location Privacy for Cellular Systems; Analysis and Solution....Pages 40-58
Towards Modeling Wireless Location Privacy....Pages 59-77
Failures in a Hybrid Content Blocking System....Pages 78-92
Anonymity Preserving Techniques in Trust Negotiations....Pages 93-109
Unmixing Mix Traffic....Pages 110-127
Mix-Network with Stronger Security....Pages 128-146
Covert Channels in IPv6....Pages 147-166
Towards Privacy-Aware eLearning....Pages 167-178
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies....Pages 179-196
Privacy Issues in Vehicular Ad Hoc Networks....Pages 197-209
High-Power Proxies for Enhancing RFID Privacy and Utility....Pages 210-226
Integrating Utility into Face De-identification....Pages 227-242
Privacy in India: Attitudes and Awareness....Pages 243-258
Economics of Identity Management: A Supply-Side Perspective....Pages 259-272
Back Matter....Pages -