Amazon cover image
Image from Amazon.com

Privacy enhancing technologies : 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, proceedings / Emiliano De Cristofaro, Matthew Wright (eds.).

By: (13th : PETS (Symposium) (13th : 2013 : Bloomington, Ind.)Contributor(s): De Cristofaro, Emiliano [editor.] | Wright, Matthew (Computer scientist) [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 7981. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Berlin : Springer, [2013]Copyright date: ©2013Description: 1 online resource (x, 264 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642390777; 3642390773Other title: PETS 2013Subject(s): Computer security -- Congresses | Data protection -- Congresses | Computer Security | Computer Systems | Privacy | Computer security | Data protection | Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Systems and Data Security | Management of Computing and Information Systems | Computers and Society | Algorithm Analysis and Problem Complexity | computerwetenschappen | computer sciences | informatiesystemen | algoritmen | algorithms | computeranalyse | computer analysis | computers | samenleving | society | gegevensbeheer | data management | computernetwerken | computer networks | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Congress | Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Print version:: Privacy enhancing technologies. PETS (Symposium) (13th : 2013 : Bloomington, Ind.).DDC classification: 005.8 LOC classification: QA76.9.A25 | .P48 2013NLM classification: QA 76.9.A25Online resources: Click here to access online
Contents:
Optimizing ORAM and Using It Efficiently for Secure Computation / Craig Gentry, Kenny A. Goldman, Shai Halevi -- Anonymity-Preserving Public-Key Encryption: A Constructive Approach / Markulf Kohlweiss, Ueli Maurer, Cristina Onete -- Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems / Gesine Hinterwälder, Christian T. Zenger -- Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error / Qinghua Li, Guohong Cao -- Broadening the Scope of Differential Privacy Using Metrics / Konstantinos Chatzikokolakis, Miguel E. Andrés -- Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet / Hamed Soroush, Keen Sung, Erik Learned-Miller -- How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots / Nevena Vratonjic, Kévin Huguenin, Vincent Bindschaedler -- The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting / Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg -- How Low Can You Go: Balancing Performance with Anonymity in Tor / John Geddes, Rob Jansen, Nicholas Hopper -- OSS: Using Online Scanning Services for Censorship Circumvention / David Fifield, Gabi Nakibly, Dan Boneh -- The Need for Flow Fingerprints to Link Correlated Network Flows / Amir Houmansadr, Nikita Borisov -- How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness / Terence Chen, Abdelberi Chaabane, Pierre Ugo Tournoux -- On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards / Marian Harbach, Sascha Fahl, Matthias Rieger.
Summary: This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013. The 13 full papers presented were carefully selected from 69 submissions. Topics addressed include data privacy, privacy-oriented cryptography, location privacy, performance of the Tor network, censorship evasion, traffc analysis, and user-related privacy perspectives.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

International conference proceedings.

Includes author index.

Optimizing ORAM and Using It Efficiently for Secure Computation / Craig Gentry, Kenny A. Goldman, Shai Halevi -- Anonymity-Preserving Public-Key Encryption: A Constructive Approach / Markulf Kohlweiss, Ueli Maurer, Cristina Onete -- Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems / Gesine Hinterwälder, Christian T. Zenger -- Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error / Qinghua Li, Guohong Cao -- Broadening the Scope of Differential Privacy Using Metrics / Konstantinos Chatzikokolakis, Miguel E. Andrés -- Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet / Hamed Soroush, Keen Sung, Erik Learned-Miller -- How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots / Nevena Vratonjic, Kévin Huguenin, Vincent Bindschaedler -- The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting / Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg -- How Low Can You Go: Balancing Performance with Anonymity in Tor / John Geddes, Rob Jansen, Nicholas Hopper -- OSS: Using Online Scanning Services for Censorship Circumvention / David Fifield, Gabi Nakibly, Dan Boneh -- The Need for Flow Fingerprints to Link Correlated Network Flows / Amir Houmansadr, Nikita Borisov -- How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness / Terence Chen, Abdelberi Chaabane, Pierre Ugo Tournoux -- On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards / Marian Harbach, Sascha Fahl, Matthias Rieger.

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013. The 13 full papers presented were carefully selected from 69 submissions. Topics addressed include data privacy, privacy-oriented cryptography, location privacy, performance of the Tor network, censorship evasion, traffc analysis, and user-related privacy perspectives.

Print version record.

Powered by Koha