Privacy enhancing technologies. Second international workshop, PET 2002, San Francisco, CA, USA, April 14--15, 2002. Revised papers (Q1872617)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Privacy enhancing technologies. Second international workshop, PET 2002, San Francisco, CA, USA, April 14--15, 2002. Revised papers
scientific article

    Statements

    Privacy enhancing technologies. Second international workshop, PET 2002, San Francisco, CA, USA, April 14--15, 2002. Revised papers (English)
    0 references
    14 May 2003
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 0976.68578). Indexed articles: \textit{Goldberg, Ian}, Privacy-enhancing technologies for the internet. II: Five years later, 1-12 [Zbl 1045.68719] \textit{Alsaid, Adil; Martin, David}, Detecting web bugs with Bugnosis: Privacy advocacy through education, 13-26 [Zbl 1045.68626] \textit{Abadi, Martín}, Private authentication, 27-40 [Zbl 1045.68615] \textit{Serjantov, Andrei; Danezis, George}, Towards an information theoretic metric for anonymity, 41-53 [Zbl 1045.68913] \textit{Díaz, Claudia; Seys, Stefaan; Claessens, Joris; Preneel, Bart}, Towards measuring anonymity, 54-68 [Zbl 1045.68694] \textit{Karjoth, Günter; Schunter, Matthias; Waidner, Michael}, Platform for enterprise privacy practices: Privacy-enabled management of customer data, 69-84 [Zbl 1045.68757] \textit{Dornbach, Péter; Németh, Zoltán}, Privacy enhancing profile disclosure, 85-98 [Zbl 1045.68697] \textit{Alamäki, Tero; Björksten, Margareta; Dornbach, Péter; Gripenberg, Casper; Győrbíró, Norbert; Márton, Gábor; Németh, Zoltán; Skyttä, Timo; Tarkiainen, Mikko}, Privacy enhancing service architectures, 99-109 [Zbl 1045.68624] \textit{Berthold, Oliver; Langos, Heinrich}, Dummy traffic against long term intersection attacks, 110-128 [Zbl 1045.68643] \textit{Seamons, Kent E.; Winslett, Marianne; Yu, Ting; Yu, Lina; Jarvis, Ryan}, Protecting privacy during on-line trust negotiation, 129-143 [Zbl 1045.68910] \textit{Iliev, Alex; Smith, Sean}, Prototyping an armored data vault, 144-159 [Zbl 1045.68746] \textit{Li, Yingjiu; Wang, Lingyu; Jajodia, Sushil}, Preventing interval-based inference by random data perturbation, 160-170 [Zbl 1045.68793] \textit{Hintz, Andrew}, Fingerprinting websites using traffic analysis, 171-178 [Zbl 1045.68744] \textit{Demuth, Thomas}, A passive attack on the privacy of web users using standard log information, 179-193 [Zbl 1045.68688] \textit{Giffin, John; Greenstadt, Rachel; Litwack, Peter; Tibbetts, Richard}, Covert messaging through TCP timestamps, 194-208 [Zbl 1045.68715] \textit{Asonov, Dmitri; Freytag, Johann-Christoph}, Almost optimal private information retrieval, 209-223 [Zbl 1045.68633] \textit{Kesdogan, Dogan; Borning, Mark; Schmeink, Michael}, Unobservable surfing on the world wide web: Is private information retrieval an alternative to the MIX based approach?, 224-238 [Zbl 1045.68763]
    0 references
    PET 2002
    0 references
    Privacy enhancing technology
    0 references
    San Francisco, CA, USA
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references