Fr. 65.00

Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

List of contents

Optimizing ORAM and Using It Efficiently for Secure Computation.- Anonymity-Preserving Public-Key Encryption: A Constructive Approach.- Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.- Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error.- Broadening the Scope of Differential Privacy Using Metrics.- Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.- How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.- The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting.- How Low Can You Go: Balancing Performance with Anonymity in Tor.- OSS: Using Online Scanning Services for Censorship Circumvention.- The Need for Flow Fingerprints to Link Correlated Network Flows.- How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.- On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.

Summary

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Product details

Assisted by Emilian De Cristofaro (Editor), Emiliano De Cristofaro (Editor), WRIGHT (Editor), Wright (Editor), Matthew Wright (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 27.05.2013
 
EAN 9783642390760
ISBN 978-3-642-39076-0
No. of pages 265
Dimensions 155 mm x 235 mm x 18 mm
Weight 423 g
Illustrations X, 265 p. 88 illus.
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.