Privacy Enhancing Technologies

5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers

  • George Danezis
  • David Martin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3856)

Table of contents

  1. Front Matter
  2. George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine
    Pages 1-11
  3. Andrei Serjantov, Steven J. Murdoch
    Pages 26-39
  4. Geir M. Køien, Vladimir A. Oleshchuk
    Pages 40-58
  5. Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki
    Pages 59-77
  6. Richard Clayton
    Pages 78-92
  7. Indrakshi Ray, Elisa Bertino, Anna C. Squicciarini, Elena Ferrari
    Pages 93-109
  8. Ye Zhu, Riccardo Bettati
    Pages 110-127
  9. Jan Camenisch, Anton Mityagin
    Pages 128-146
  10. Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin
    Pages 147-166
  11. Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, Hagen Wahrig
    Pages 167-178
  12. Florian Dötzer
    Pages 197-209
  13. Ari Juels, Paul Syverson, Dan Bailey
    Pages 210-226
  14. Ralph Gross, Edoardo Airoldi, Bradley Malin, Latanya Sweeney
    Pages 227-242
  15. Ponnurangam Kumaraguru, Lorrie Cranor
    Pages 243-258
  16. Sven Koble, Rainer Böhme
    Pages 259-272
  17. Back Matter

About these proceedings

Keywords

RFID anonymity control identity identity management management monitoring network security networks partial attacks privacy privacy-aware learning security technology trust

Editors and affiliations

  • George Danezis
    • 1
  • David Martin
    • 2
  1. 1.Microsoft ResearchCambridgeUK
  2. 2.Artificial Intelligence CenterSRI InternationalUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11767831
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-34745-3
  • Online ISBN 978-3-540-34746-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book