This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002.
The 17 revised full papers presented were carefully selected during two rounds of reviewing and improvement. Among the topics addressed are Internet security, private authentication, information theoretic anonymity, anonymity measuring, enterprise privacy practices, service architectures for privacy, intersection attacks, online trust negotiation, random data perturbation, Website fingerprinting, Web user privacy, TCP timestamps, private information retrieval, and unobservable Web surfing.
Author(s): Ian Goldberg (auth.), Roger Dingledine, Paul Syverson (eds.)
Series: Lecture Notes in Computer Science 2482
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 242
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Information Storage and Retrieval; Computers and Society; Management of Computing and Information Systems
Privacy-Enhancing Technologies for the Internet, II: Five Years Later....Pages 1-12
Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education....Pages 13-26
Private Authentication....Pages 27-40
Towards an Information Theoretic Metric for Anonymity....Pages 41-53
Towards Measuring Anonymity....Pages 54-68
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data....Pages 69-84
Privacy Enhancing Profile Disclosure....Pages 85-98
Privacy Enhancing Service Architectures....Pages 99-109
Dummy Traffic against Long Term Intersection Attacks....Pages 110-128
Protecting Privacy during On-Line Trust Negotiation....Pages 129-143
Prototyping an Armored Data Vault....Pages 144-159
Preventing Interval-Based Inference by Random Data Perturbation....Pages 160-170
Fingerprinting Websites Using Traffic Analysis....Pages 171-178
A Passive Attack on the Privacy of Web Users Using Standard Log Information....Pages 179-193
Covert Messaging through TCP Timestamps....Pages 194-208
Almost Optimal Private Information Retrieval....Pages 209-223
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?....Pages 224-238