Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Herstellerkennzeichnung
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
David Martin, University of Massachusetts Lowell, USA / Andrei Serjantov, University of Cambridge, UK
Inhaltsangabe
Anonymity and Covert Channels in Simple Timed Mix-Firewalls.- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.- The Traffic Analysis of Continuous-Time Mixes.- Reputable Mix Networks.- Secure Outsourcing of Sequence Comparisons.- An Improved Construction for Universal Re-encryption.- Electromagnetic Eavesdropping Risks of Flat-Panel Displays.- On the Anonymity of Banknotes.- FLASCHE - A Mechanism Providing Anonymity for Mobile Users.- Cryptographically Protected Prefixes for Location Privacy in IPv6.- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.- Synchronous Batching: From Cascades to Free Routes.- On Flow Correlation Attacks and Countermeasures in Mix Networks.- Measuring Anonymity in a Non-adaptive, Real-Time System.- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?.- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".- A Formal Privacy System and Its Application to Location Based Services.- Privacy-Preserving Trust Negotiations.- Language-Based Enforcement of Privacy Policies.- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior.- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
Anonymity and Covert Channels in Simple Timed Mix-Firewalls.- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.- The Traffic Analysis of Continuous-Time Mixes.- Reputable Mix Networks.- Secure Outsourcing of Sequence Comparisons.- An Improved Construction for Universal Re-encryption.- Electromagnetic Eavesdropping Risks of Flat-Panel Displays.- On the Anonymity of Banknotes.- FLASCHE - A Mechanism Providing Anonymity for Mobile Users.- Cryptographically Protected Prefixes for Location Privacy in IPv6.- Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.- Synchronous Batching: From Cascades to Free Routes.- On Flow Correlation Attacks and Countermeasures in Mix Networks.- Measuring Anonymity in a Non-adaptive, Real-Time System.- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?.- On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".- A Formal Privacy System and Its Application to Location Based Services.- Privacy-Preserving Trust Negotiations.- Language-Based Enforcement of Privacy Policies.- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.- Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior.- Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826