Cargando…

Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings /

This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009. The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from acad...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Goldberg, Ian (Editor ), Atallah, Mikhail (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5672
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-03168-7
003 DE-He213
005 20220114135314.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642031687  |9 978-3-642-03168-7 
024 7 |a 10.1007/978-3-642-03168-7  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Privacy Enhancing Technologies  |h [electronic resource] :  |b 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings /  |c edited by Ian Goldberg, Mikhail Atallah. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a X, 255 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5672 
505 0 |a Ninth Privacy Enhancing Technologies Symposium -- Capturing Social Networking Privacy Preferences: -- Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design -- A Comparative Study of Online Privacy Policies and Formats -- Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications -- Scalable Link-Based Relay Selection for Anonymous Routing -- Using Linkability Information to Attack Mix-Based Anonymity Services -- Physical Layer Attacks on Unlinkability in Wireless LANs -- RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests -- Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default -- Privacy-Preserving Policy-Based Information Transfer -- Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases -- APOD: Anonymous Physical Object Delivery -- On the Optimal Placement of Mix Zones -- Privacy-Preserving Face Recognition. 
520 |a This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009. The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 0 |a Data protection. 
650 0 |a Information storage and retrieval systems. 
650 0 |a Computers and civilization. 
650 0 |a Electronic data processing-Management. 
650 1 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Computers and Society. 
650 2 4 |a IT Operations. 
700 1 |a Goldberg, Ian.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Atallah, Mikhail.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642031694 
776 0 8 |i Printed edition:  |z 9783642031670 
830 0 |a Security and Cryptology ;  |v 5672 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-03168-7  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)