Advertisement

Privacy Enhancing Technologies

8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

  • Editors
  • Nikita¬†Borisov
  • Ian¬†Goldberg

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5134)

Table of contents

  1. Front Matter
  2. Stuart Shapiro, Aaron Powell
    Pages 1-1
  3. Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
    Pages 2-23
  4. Alejandro Hevia, Daniele Micciancio
    Pages 24-43
  5. Claudia Diaz, Carmela Troncoso, Andrei Serjantov
    Pages 44-62
  6. Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
    Pages 63-76
  7. Erik Shimshock, Matt Staats, Nick Hopper
    Pages 99-114
  8. Steven J. Murdoch, Robert N. M. Watson
    Pages 115-132
  9. Hatim Daginawala, Matthew Wright
    Pages 133-150
  10. George Danezis, Paul Syverson
    Pages 151-166
  11. Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed
    Pages 167-186
  12. George Danezis, Len Sassaman
    Pages 187-201
  13. Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin
    Pages 202-218
  14. Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin
    Pages 219-236
  15. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.

The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

 

Keywords

access control anonymity authentication censorship certification content filtering credential systems fielded systems firewall identity management key management location privacy network security obligation management p p2p systems privacy

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-70630-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-70629-8
  • Online ISBN 978-3-540-70630-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace