Atjaunināt sīkdatņu piekrišanu

Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings [Mīkstie vāki]

  • Formāts: Paperback / softback, 285 pages, height x width: 235x155 mm, weight: 456 g, X, 285 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6794
  • Izdošanas datums: 12-Jul-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642222625
  • ISBN-13: 9783642222627
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 285 pages, height x width: 235x155 mm, weight: 456 g, X, 285 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6794
  • Izdošanas datums: 12-Jul-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642222625
  • ISBN-13: 9783642222627

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues.

How Unique and Traceable are Usernames?
1(17)
Daniele Perito
Claude Castelluccia
Mohamed Ali Kaafar
Pere Manils
Text Classification for Data Loss Prevention
18(20)
Michael Hart
Pratyusa Manadhata
Rob Johnson
P3CA: Private Anomaly Detection Across ISP Networks
38(19)
Shishir Nagaraja
Virajith Jalaparti
Matthew Caesar
Nikita Borisov
Quantifying Location Privacy: The Case of Sporadic Location Exposure
57(20)
Reza Shokri
George Theodorakopoulos
George Danezis
Jean-Pierre Hubaux
Jean-Yves Le Boudec
Privacy in Mobile Computing for Location-Sharing-Based Services
77(20)
Igor Bilogrevic
Murtuza Jadliwala
Kubra Kalkan
Jean-Pierre Hubaux
Imad Aad
On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
97(20)
Davide Zanetti
Pascal Sachs
Srdjan Capkun
An Accurate System-Wide Anonymity Metric for Probabilistic Attacks
117(17)
Rajiv Bagai
Huabo Lu
Rong Li
Bin Tang
DefenestraTor: Throwing Out Windows in Tor
134(21)
Mashael AlSabah
Kevin Bauer
Ian Goldberg
Dirk Grunwald
Damon McCoy
Stefan Savage
Geoffrey M. Voelker
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P
155(20)
Michael Herrmann
Christian Grothoff
Privacy-Friendly Aggregation for the Smart-Grid
175(17)
Klaus Kursawe
George Danezis
Markulf Kohlweiss
Plug-In Privacy for Smart Metering Billing
192(19)
Marek Jawurek
Martin Johns
Florian Kerschbaum
Scramble! Your Social Network Data
211(15)
Filipe Beato
Markulf Kohlweiss
Karel Wouters
A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage
226(20)
Mehmet Kuzu
Murat Kantarcioglu
Elizabeth Durham
Bradley Malin
Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System
246(18)
Amang Sudarsono
Toru Nakanishi
Nobuo Funabiki
Broker-Based Private Matching
264(21)
Abdullatif Shikfa
Melek Onen
Refik Molva
Author Index 285