Privacy Enhancing Technologies

9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings

  • Ian Goldberg
  • Mikhail J. Atallah
Conference proceedings PETS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5672)

Table of contents

  1. Front Matter
  2. Ninth Privacy Enhancing Technologies Symposium

    1. Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh
      Pages 1-18
    2. Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor
      Pages 37-55
    3. Micah Sherr, Matt Blaze, Boon Thau Loo
      Pages 73-93
    4. Stefan Schiffner, Sebastian Clauß
      Pages 94-107
    5. Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
      Pages 108-127
    6. Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall
      Pages 143-163
    7. Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
      Pages 164-184
    8. Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
      Pages 185-201
    9. Elli Androulaki, Steven Bellovin
      Pages 202-215
    10. Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
      Pages 216-234
    11. Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft
      Pages 235-253
  3. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009.

The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.


access control aggregate query anonymity authentication certification collaborative filtering fault-tolerance firewall identity management integrity key management location privacy mining default policies network security outsource p2p syst

Editors and affiliations

  • Ian Goldberg
    • 1
  • Mikhail J. Atallah
    • 2
  1. 1.David R. Cheriton School of Computer ScienceUniversity of WaterlooWaterlooCanada
  2. 2.Department of Computer SciencePurdue UniversityWest LafayeteUSA

Bibliographic information