Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

  • George Danezis
  • Philippe Golle

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)

Table of contents

  1. Front Matter
  2. 6th Workshop on Privacy Enhancing Technologies

    1. Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
      Pages 1-19
    2. Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
      Pages 20-35
    3. Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
      Pages 78-98
    4. Chris Vanden Berghe, Matthias Schunter
      Pages 99-117
    5. Marco Casassa Mont, Robert Thyne
      Pages 118-134
    6. Nicholas Paul Sheppard, Reihaneh Safavi-Naini
      Pages 152-171
    7. Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O’Neill
      Pages 208-222
    8. Lasse Øverlier, Paul Syverson
      Pages 223-244
    9. Roger Dingledine, Andrei Serjantov, Paul Syverson
      Pages 245-257
    10. Joseph A. Calandrino, Alfred C. Weaver
      Pages 258-276
    11. Susan Hohenberger, Stephen A. Weis
      Pages 277-294
    12. Gene Tsudik, Shouhuai Xu
      Pages 295-315
    13. Levente Buttyán, Tamás Holczer, István Vajda
      Pages 332-350

About these proceedings

Keywords

Bridge RFID security access control content filtering credential systems data security firewall information network security p2p systems privacy privacy preservation secret hand security trust

Editors and affiliations

  • George Danezis
    • 1
  • Philippe Golle
    • 2
  1. 1.Microsoft ResearchCambridgeUK
  2. 2.Palo Alto Research CenterPalo AltoUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11957454
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-68790-0
  • Online ISBN 978-3-540-68793-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book