Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers /

Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers / [electronic resource] : edited by George Danezis, David Martin. - 1st ed. 2006. - VIII, 276 p. online resource. - Security and Cryptology, 3856 2946-1863 ; . - Security and Cryptology, 3856 .

Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.

9783540347460

10.1007/11767831 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Operating Systems.
Information Storage and Retrieval.
Computers and Society.
IT Operations.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in