Skip to main content
  • Conference proceedings
  • © 2003

Privacy Enhancing Technologies

Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2482)

Conference series link(s): PET: International Workshop on Privacy Enhancing Technologies

Conference proceedings info: PET 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

    Pages I-VIII
  2. Private Authentication

    • Martín Abadi
    Pages 27-40
  3. Towards an Information Theoretic Metric for Anonymity

    • Andrei Serjantov, George Danezis
    Pages 41-53
  4. Towards Measuring Anonymity

    • Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel
    Pages 54-68
  5. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data

    • Günter Karjoth, Matthias Schunter, Michael Waidner
    Pages 69-84
  6. Privacy Enhancing Profile Disclosure

    • Péter Dornbach, Zoltán Németh
    Pages 85-98
  7. Privacy Enhancing Service Architectures

    • Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert GyÅ‘rbíró, Gábor Márton et al.
    Pages 99-109
  8. Dummy Traffic against Long Term Intersection Attacks

    • Oliver Berthold, Heinrich Langos
    Pages 110-128
  9. Protecting Privacy during On-Line Trust Negotiation

    • Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
    Pages 129-143
  10. Prototyping an Armored Data Vault

    • Alex Iliev, Sean Smith
    Pages 144-159
  11. Preventing Interval-Based Inference by Random Data Perturbation

    • Yingjiu Li, Lingyu Wang, Sushil Jajodia
    Pages 160-170
  12. Covert Messaging through TCP Timestamps

    • John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts
    Pages 194-208
  13. Almost Optimal Private Information Retrieval

    • Dmitri Asonov, Johann-Christoph Freytag
    Pages 209-223
  14. Back Matter

    Pages 239-239

Editors and Affiliations

  • The Free Haven Project, Arlington, USA

    Roger Dingledine

  • Naval Research Laboratory, Washington, USA

    Paul Syverson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access