Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings / [electronic resource] :
edited by Nikita Borisov, Ian Goldberg.
- 1st ed. 2008.
- X, 237 p. online resource.
- Security and Cryptology, 5134 2946-1863 ; .
- Security and Cryptology, 5134 .
Analyzing PETs for Enterprise Operations -- Perfect Matching Disclosure Attacks -- An Indistinguishability-Based Characterization of Anonymous Channels -- On the Impact of Social Network Profiling on Anonymity -- Shining Light in Dark Places: Understanding the Tor Network -- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover -- Breaking and Provably Fixing Minx -- Metrics for Security and Performance in Low-Latency Anonymity Systems -- Studying Timing Analysis on the Internet with SubRosa -- Bridging and Fingerprinting: Epistemic Attacks on Route Selection -- Chattering Laptops -- How to Bypass Two Anonymity Revocation Schemes -- Reputation Systems for Anonymous Networks -- PAR: Payment for Anonymous Routing.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. .
9783540706304
10.1007/978-3-540-70630-4 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824
Analyzing PETs for Enterprise Operations -- Perfect Matching Disclosure Attacks -- An Indistinguishability-Based Characterization of Anonymous Channels -- On the Impact of Social Network Profiling on Anonymity -- Shining Light in Dark Places: Understanding the Tor Network -- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover -- Breaking and Provably Fixing Minx -- Metrics for Security and Performance in Low-Latency Anonymity Systems -- Studying Timing Analysis on the Internet with SubRosa -- Bridging and Fingerprinting: Epistemic Attacks on Route Selection -- Chattering Laptops -- How to Bypass Two Anonymity Revocation Schemes -- Reputation Systems for Anonymous Networks -- PAR: Payment for Anonymous Routing.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. .
9783540706304
10.1007/978-3-540-70630-4 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Information storage and retrieval systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Information Storage and Retrieval.
Computers and Society.
IT Operations.
QA268
005.824