Skip to main content
  • Conference proceedings
  • © 2008

Privacy Enhancing Technologies

8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5134)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PETS: International Symposium on Privacy Enhancing Technologies Symposium

Conference proceedings info: PETS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

  2. Analyzing PETs for Enterprise Operations

    • Stuart Shapiro, Aaron Powell
    Pages 1-1
  3. Perfect Matching Disclosure Attacks

    • Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
    Pages 2-23
  4. An Indistinguishability-Based Characterization of Anonymous Channels

    • Alejandro Hevia, Daniele Micciancio
    Pages 24-43
  5. On the Impact of Social Network Profiling on Anonymity

    • Claudia Diaz, Carmela Troncoso, Andrei Serjantov
    Pages 44-62
  6. Shining Light in Dark Places: Understanding the Tor Network

    • Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
    Pages 63-76
  7. Breaking and Provably Fixing Minx

    • Erik Shimshock, Matt Staats, Nick Hopper
    Pages 99-114
  8. Metrics for Security and Performance in Low-Latency Anonymity Systems

    • Steven J. Murdoch, Robert N. M. Watson
    Pages 115-132
  9. Studying Timing Analysis on the Internet with SubRosa

    • Hatim Daginawala, Matthew Wright
    Pages 133-150
  10. Bridging and Fingerprinting: Epistemic Attacks on Route Selection

    • George Danezis, Paul Syverson
    Pages 151-166
  11. Chattering Laptops

    • Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed
    Pages 167-186
  12. How to Bypass Two Anonymity Revocation Schemes

    • George Danezis, Len Sassaman
    Pages 187-201
  13. Reputation Systems for Anonymous Networks

    • Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin
    Pages 202-218
  14. PAR: Payment for Anonymous Routing

    • Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin
    Pages 219-236
  15. Back Matter

Other Volumes

  1. Privacy Enhancing Technologies

About this book

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.

The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

 

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access