2. PET 2002:
San Francisco,
CA,
USA
Roger Dingledine, Paul F. Syverson (Eds.):
Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers.
Lecture Notes in Computer Science 2482 Springer 2003, ISBN 3-540-00565-X @proceedings{DBLP:conf/pet/2002,
editor = {Roger Dingledine and
Paul F. Syverson},
title = {Privacy Enhancing Technologies, Second International Workshop,
PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised
Papers},
booktitle = {Privacy Enhancing Technologies},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2482},
year = {2003},
isbn = {3-540-00565-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Ian Goldberg:
Privacy-Enhancing Technologies for the Internet, II: Five Years Later.
1-12
- Adil Alsaid, David Martin:
Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education.
13-26
- Martín Abadi:
Private Authentication.
27-40
- Andrei Serjantov, George Danezis:
Towards an Information Theoretic Metric for Anonymity.
41-53
- Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel:
Towards Measuring Anonymity.
54-68
- Günter Karjoth, Matthias Schunter, Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
69-84
- Péter Dornbach, Zoltán Németh:
Privacy Enhancing Profile Disclosure.
85-98
- Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen:
Privacy Enhancing Service Architectures.
99-109
- Oliver Berthold, Heinrich Langos:
Dummy Traffic against Long Term Intersection Attacks.
110-128
- Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis:
Protecting Privacy during On-Line Trust Negotiation.
129-143
- Alexander Iliev, Sean W. Smith:
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.
144-159
- Yingjiu Li, Lingyu Wang, Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation.
160-170
- Andrew Hintz:
Fingerprinting Websites Using Traffic Analysis.
171-178
- Thomas Demuth:
A Passive Attack on the Privacy of Web Users Using Standard Log Information.
179-193
- John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts:
Covert Messaging through TCP Timestamps.
194-208
- Dmitri Asonov, Johann Christoph Freytag:
Almost Optimal Private Information Retrieval.
209-223
- Dogan Kesdogan, Mark Borning, Michael Schmeink:
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?
224-238
Copyright © Sun Mar 14 23:20:46 2010
by Michael Ley (ley@uni-trier.de)