Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

Editors:

ISBN: 978-3-540-68790-0 (Print) 978-3-540-68793-1 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. 6th Workshop on Privacy Enhancing Technologies

    1. No Access

      Book Chapter

      Pages 1-19

      Privacy for Public Transportation

    2. No Access

      Book Chapter

      Pages 20-35

      Ignoring the Great Firewall of China

    3. No Access

      Book Chapter

      Pages 36-58

      Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook

    4. No Access

      Book Chapter

      Pages 59-77

      Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks

    5. No Access

      Book Chapter

      Pages 78-98

      Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management

    6. No Access

      Book Chapter

      Pages 99-117

      Privacy Injector — Automated Privacy Enforcement Through Aspects

    7. No Access

      Book Chapter

      Pages 118-134

      A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises

    8. No Access

      Book Chapter

      Pages 135-151

      One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique

    9. No Access

      Book Chapter

      Pages 152-171

      Protecting Privacy with the MPEG-21 IPMP Framework

    10. No Access

      Book Chapter

      Pages 172-189

      Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement

    11. No Access

      Book Chapter

      Pages 190-207

      Improving Sender Anonymity in a Structured Overlay with Imprecise Routing

    12. No Access

      Book Chapter

      Pages 208-222

      Selectively Traceable Anonymity

    13. No Access

      Book Chapter

      Pages 223-244

      Valet Services: Improving Hidden Servers with a Personal Touch

    14. No Access

      Book Chapter

      Pages 245-257

      Blending Different Latency Traffic with Alpha-mixing

    15. No Access

      Book Chapter

      Pages 258-276

      Private Resource Pairing

    16. No Access

      Book Chapter

      Pages 277-294

      Honest-Verifier Private Disjointness Testing Without Random Oracles

    17. No Access

      Book Chapter

      Pages 295-315

      A Flexible Framework for Secret Handshakes

    18. No Access

      Book Chapter

      Pages 316-331

      On the Security of the Tor Authentication Protocol

    19. No Access

      Book Chapter

      Pages 332-350

      Optimal Key-Trees for Tree-Based Private Authentication

    20. No Access

      Book Chapter

      Pages 351-367

      Simple and Flexible Revocation Checking with Privacy

previous Page of 2