Skip to main content
  • Conference proceedings
  • © 2006

Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4258)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PET: International Workshop on Privacy Enhancing Technologies

Conference proceedings info: PET 2006.

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-68793-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

  2. 6th Workshop on Privacy Enhancing Technologies

    1. Privacy for Public Transportation

      • Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
      Pages 1-19
    2. Ignoring the Great Firewall of China

      • Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
      Pages 20-35
    3. Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management

      • Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
      Pages 78-98
    4. Privacy Injector — Automated Privacy Enforcement Through Aspects

      • Chris Vanden Berghe, Matthias Schunter
      Pages 99-117
    5. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises

      • Marco Casassa Mont, Robert Thyne
      Pages 118-134
    6. Protecting Privacy with the MPEG-21 IPMP Framework

      • Nicholas Paul Sheppard, Reihaneh Safavi-Naini
      Pages 152-171
    7. Selectively Traceable Anonymity

      • Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O’Neill
      Pages 208-222
    8. Valet Services: Improving Hidden Servers with a Personal Touch

      • Lasse Øverlier, Paul Syverson
      Pages 223-244
    9. Blending Different Latency Traffic with Alpha-mixing

      • Roger Dingledine, Andrei Serjantov, Paul Syverson
      Pages 245-257
    10. Private Resource Pairing

      • Joseph A. Calandrino, Alfred C. Weaver
      Pages 258-276
    11. Honest-Verifier Private Disjointness Testing Without Random Oracles

      • Susan Hohenberger, Stephen A. Weis
      Pages 277-294
    12. A Flexible Framework for Secret Handshakes

      • Gene Tsudik, Shouhuai Xu
      Pages 295-315
    13. Optimal Key-Trees for Tree-Based Private Authentication

      • Levente Buttyán, Tamás Holczer, István Vajda
      Pages 332-350

Other Volumes

  1. Privacy Enhancing Technologies

    6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

Keywords

  • Bridge
  • RFID security
  • access control
  • content filtering
  • credential systems
  • data security
  • firewall
  • information
  • network security
  • p2p systems
  • privacy
  • privacy preservation
  • secret hand
  • security
  • trust

Editors and Affiliations

  • Microsoft Research, Cambridge, UK

    George Danezis

  • Palo Alto Research Center, Palo Alto, USA

    Philippe Golle

Bibliographic Information

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-68793-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.00
Price excludes VAT (USA)