注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全隱私增強(qiáng)技術(shù):PET 2006 /會(huì)議論文選

隱私增強(qiáng)技術(shù):PET 2006 /會(huì)議論文選

隱私增強(qiáng)技術(shù):PET 2006 /會(huì)議論文選

定 價(jià):¥632.80

作 者: George Danezis 著
出版社: 廣東教育出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書(shū)可以去


ISBN: 9783540687900 出版時(shí)間: 2006-12-01 包裝: 平裝
開(kāi)本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections.The 24 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing and improvement. The papers both from academia and industry present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

作者簡(jiǎn)介

暫缺《隱私增強(qiáng)技術(shù):PET 2006 /會(huì)議論文選》作者簡(jiǎn)介

圖書(shū)目錄

6th Workshop on Privacy Enhancing Technologies
Privacy for Public Transportation
Ignoring the Great Firewall of China
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
Privacy Injector -- Automated Privacy Enforcement Through Aspects
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique
Protecting Privacy with the MPEG-21 IPMP Framework
Personal Rights Management Taming Camera-Phones for Individual Privacy Enforcement
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing
Selectively Traceable Anonymity
Valet Services: Imoroving Hidden Servers with a Personal Touch
Blending Different Latency Traffic with Alpha-mixing
Private Resource Pairing
Honest-Verifier Private Disjointness Testing Without Random Oracles
A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication)
On the Security of the Tor Authentication Protocol
Optimal Trees tor Tree-Based Private Authentication
Simple and Flexible Revocation Checking with Privacy
Breaking the Collusion Detection Mechanism of MorphMix
Linking Anonymous Transactions: The Consistent View Attack
Preserving User Location Privacy in Mobile Data Management Infrastructures
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment
Author lndex

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)