Skip to main content
  • Conference proceedings
  • © 2008

Privacy Enhancing Technologies

8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5134)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PETS: International Symposium on Privacy Enhancing Technologies Symposium

Conference proceedings info: PETS 2008.

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-70630-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (14 papers)

  1. Front Matter

  2. Analyzing PETs for Enterprise Operations

    • Stuart Shapiro, Aaron Powell
    Pages 1-1
  3. Perfect Matching Disclosure Attacks

    • Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
    Pages 2-23
  4. An Indistinguishability-Based Characterization of Anonymous Channels

    • Alejandro Hevia, Daniele Micciancio
    Pages 24-43
  5. On the Impact of Social Network Profiling on Anonymity

    • Claudia Diaz, Carmela Troncoso, Andrei Serjantov
    Pages 44-62
  6. Shining Light in Dark Places: Understanding the Tor Network

    • Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
    Pages 63-76
  7. Breaking and Provably Fixing Minx

    • Erik Shimshock, Matt Staats, Nick Hopper
    Pages 99-114
  8. Metrics for Security and Performance in Low-Latency Anonymity Systems

    • Steven J. Murdoch, Robert N. M. Watson
    Pages 115-132
  9. Studying Timing Analysis on the Internet with SubRosa

    • Hatim Daginawala, Matthew Wright
    Pages 133-150
  10. Bridging and Fingerprinting: Epistemic Attacks on Route Selection

    • George Danezis, Paul Syverson
    Pages 151-166
  11. Chattering Laptops

    • Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed
    Pages 167-186
  12. How to Bypass Two Anonymity Revocation Schemes

    • George Danezis, Len Sassaman
    Pages 187-201
  13. Reputation Systems for Anonymous Networks

    • Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin
    Pages 202-218
  14. PAR: Payment for Anonymous Routing

    • Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin
    Pages 219-236
  15. Back Matter

Other Volumes

  1. Privacy Enhancing Technologies

    8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

About this book

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.

The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

 

Keywords

  • access control
  • anonymity
  • authentication
  • censorship
  • certification
  • content filtering
  • credential systems
  • fielded systems
  • firewall
  • identity management
  • key management
  • location privacy
  • network security
  • obligation management
  • p
  • p2p systems
  • privacy

Bibliographic Information

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-70630-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)