Privacy Enhancing Technologies

Second International Workshop, PET 2002 San Francisco, CA, USA, April 14–15, 2002 Revised Papers

Editors:

ISBN: 978-3-540-00565-0 (Print) 978-3-540-36467-2 (Online)

Table of contents (17 chapters)

  1. No Access

    Book Chapter

    Pages 1-12

    Privacy-Enhancing Technologies for the Internet, II: Five Years Later

  2. No Access

    Book Chapter

    Pages 13-26

    Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education

  3. No Access

    Book Chapter

    Pages 27-40

    Private Authentication

  4. No Access

    Book Chapter

    Pages 41-53

    Towards an Information Theoretic Metric for Anonymity

  5. No Access

    Book Chapter

    Pages 54-68

    Towards Measuring Anonymity

  6. No Access

    Book Chapter

    Pages 69-84

    Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data

  7. No Access

    Book Chapter

    Pages 85-98

    Privacy Enhancing Profile Disclosure

  8. No Access

    Book Chapter

    Pages 99-109

    Privacy Enhancing Service Architectures

  9. No Access

    Book Chapter

    Pages 110-128

    Dummy Traffic against Long Term Intersection Attacks

  10. No Access

    Book Chapter

    Pages 129-143

    Protecting Privacy during On-Line Trust Negotiation

  11. No Access

    Book Chapter

    Pages 144-159

    Prototyping an Armored Data Vault

  12. No Access

    Book Chapter

    Pages 160-170

    Preventing Interval-Based Inference by Random Data Perturbation

  13. No Access

    Book Chapter

    Pages 171-178

    Fingerprinting Websites Using Traffic Analysis

  14. No Access

    Book Chapter

    Pages 179-193

    A Passive Attack on the Privacy of Web Users Using Standard Log Information

  15. No Access

    Book Chapter

    Pages 194-208

    Covert Messaging through TCP Timestamps

  16. No Access

    Book Chapter

    Pages 209-223

    Almost Optimal Private Information Retrieval

  17. No Access

    Book Chapter

    Pages 224-238

    Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?