© 2006

Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

  • George Danezis
  • Philippe Golle
Conference proceedings PET 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)

Table of contents

  1. Front Matter
  2. 6th Workshop on Privacy Enhancing Technologies

    1. Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
      Pages 1-19
    2. Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
      Pages 20-35
    3. Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
      Pages 78-98
    4. Chris Vanden Berghe, Matthias Schunter
      Pages 99-117
    5. Marco Casassa Mont, Robert Thyne
      Pages 118-134
    6. Nicholas Paul Sheppard, Reihaneh Safavi-Naini
      Pages 152-171
    7. Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O’Neill
      Pages 208-222
    8. Lasse Øverlier, Paul Syverson
      Pages 223-244
    9. Roger Dingledine, Andrei Serjantov, Paul Syverson
      Pages 245-257
    10. Joseph A. Calandrino, Alfred C. Weaver
      Pages 258-276
    11. Susan Hohenberger, Stephen A. Weis
      Pages 277-294
    12. Gene Tsudik, Shouhuai Xu
      Pages 295-315
    13. Levente Buttyán, Tamás Holczer, István Vajda
      Pages 332-350

About these proceedings


Bridge RFID security access control content filtering credential systems data security firewall information network security p2p systems privacy privacy preservation secret hand security trust

Editors and affiliations

  • George Danezis
    • 1
  • Philippe Golle
    • 2
  1. 1.Microsoft ResearchCambridgeUK
  2. 2.Palo Alto Research CenterPalo AltoUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking