000 03986nam a22006375i 4500
001 978-3-540-44702-3
003 DE-He213
005 20240423132501.0
007 cr nn 008mamaa
008 121227s2001 gw | s |||| 0|eng d
020 _a9783540447023
_9978-3-540-44702-3
024 7 _a10.1007/3-540-44702-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aDesigning Privacy Enhancing Technologies
_h[electronic resource] :
_bInternational Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings /
_cedited by Hannes Federrath.
250 _a1st ed. 2001.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2001.
300 _aX, 234 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2009
505 0 _aTerminology -- Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology -- Attacks on Systems -- Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems -- The Disadvantages of Free MIX Routes and How to Overcome Them -- Anonymous Publishing -- Freenet: A Distributed Anonymous Information Storage and Retrieval System -- The Free Haven Project: Distributed Anonymous Storage Service -- Mix Systems -- Towards an Analysis of Onion Routing Security -- Web MIXes: A System for Anonymous and Unobservable Internet Access -- Identity Management -- Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age -- Identity Management Based on P3P -- Pseudonyms and Remailers -- On Pseudonymization of Audit Data for Intrusion Detection -- Protection Profiles for Remailer Mixes.
520 _aAnonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
650 0 _aComputer networks .
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer engineering.
650 0 _aOperating systems (Computers).
650 0 _aElectronic data processing
_xManagement.
650 0 _aInformation storage and retrieval systems.
650 1 4 _aComputer Communication Networks.
650 2 4 _aCryptology.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aOperating Systems.
650 2 4 _aIT Operations.
650 2 4 _aInformation Storage and Retrieval.
700 1 _aFederrath, Hannes.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540417248
776 0 8 _iPrinted edition:
_z9783662201350
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2009
856 4 0 _uhttps://doi.org/10.1007/3-540-44702-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188259
_d188259