Cargando…

Privacy Enhancing Technologies 10th International Symposium, PETS 2010, July 21-23, 2010, Berlin, Germany, Proceedings /

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Atallah, Mikhail (Editor ), Hopper, Nicholas (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6205
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-14527-8
003 DE-He213
005 20220114151809.0
007 cr nn 008mamaa
008 100707s2010 gw | s |||| 0|eng d
020 |a 9783642145278  |9 978-3-642-14527-8 
024 7 |a 10.1007/978-3-642-14527-8  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Privacy Enhancing Technologies  |h [electronic resource] :  |b 10th International Symposium, PETS 2010, July 21-23, 2010, Berlin, Germany, Proceedings /  |c edited by Mikhail Atallah, Nicholas Hopper. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a X, 291 p. 51 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6205 
505 0 |a Privacy Enhancing Technologies Symposium -- How Unique Is Your Web Browser? -- On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot -- Private Information Disclosure from Web Searches -- Collaborative, Privacy-Preserving Data Aggregation at Scale -- Privacy-Preserving Queries over Relational Databases -- Achieving Efficient Query Privacy for Location Based Services -- Making a Nymbler Nymble Using VERBS -- Anonymous Webs of Trust -- Taming Big Brother Ambitions: More Privacy for Secret Handshakes -- Preventing Active Timing Attacks in Low-Latency Anonymous Communication -- Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks -- : An Architecture for Anonymous Low-Volume Communications -- Private Web Search with Malicious Adversaries -- unFriendly: Multi-party Privacy Risks in Social Networks -- The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures -- How to Share Your Favourite Search Results while Preserving Privacy and Quality. 
520 |a This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, network topology and web search with malicious adversaries. 
650 0 |a Computer networks . 
650 0 |a Computer science. 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Algorithms. 
650 2 4 |a Computers and Society. 
700 1 |a Atallah, Mikhail.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hopper, Nicholas.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642145261 
776 0 8 |i Printed edition:  |z 9783642145285 
830 0 |a Security and Cryptology ;  |v 6205 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-14527-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)