Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

  • George Danezis
  • Philippe Golle
Conference proceedings PET 2006

DOI: 10.1007/11957454

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)

Table of contents (24 papers)

  1. Front Matter
  2. 6th Workshop on Privacy Enhancing Technologies

    1. Privacy for Public Transportation
      Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
      Pages 1-19
    2. Ignoring the Great Firewall of China
      Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
      Pages 20-35
    3. Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
      Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
      Pages 78-98
    4. Privacy Injector — Automated Privacy Enforcement Through Aspects
      Chris Vanden Berghe, Matthias Schunter
      Pages 99-117
    5. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises
      Marco Casassa Mont, Robert Thyne
      Pages 118-134
    6. Protecting Privacy with the MPEG-21 IPMP Framework
      Nicholas Paul Sheppard, Reihaneh Safavi-Naini
      Pages 152-171
    7. Selectively Traceable Anonymity
      Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O’Neill
      Pages 208-222
    8. Valet Services: Improving Hidden Servers with a Personal Touch
      Lasse Øverlier, Paul Syverson
      Pages 223-244
    9. Blending Different Latency Traffic with Alpha-mixing
      Roger Dingledine, Andrei Serjantov, Paul Syverson
      Pages 245-257
    10. Private Resource Pairing
      Joseph A. Calandrino, Alfred C. Weaver
      Pages 258-276
    11. Honest-Verifier Private Disjointness Testing Without Random Oracles
      Susan Hohenberger, Stephen A. Weis
      Pages 277-294
    12. A Flexible Framework for Secret Handshakes
      Gene Tsudik, Shouhuai Xu
      Pages 295-315
    13. Optimal Key-Trees for Tree-Based Private Authentication
      Levente Buttyán, Tamás Holczer, István Vajda
      Pages 332-350

About these proceedings


Bridge RFID security access control content filtering credential systems data security firewall information network security p2p systems privacy privacy preservation secret hand security trust

Editors and affiliations

  • George Danezis
    • 1
  • Philippe Golle
    • 2
  1. 1.Microsoft ResearchCambridgeUK
  2. 2.Palo Alto Research CenterPalo AltoUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-68790-0
  • Online ISBN 978-3-540-68793-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349