Skip to main content
  • Conference proceedings
  • © 2007

Privacy Enhancing Technologies

7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4776)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PET: International Workshop on Privacy Enhancing Technologies

Conference proceedings info: PET 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Attacking Unlinkability: The Importance of Context

    • Matthias Franz, Bernd Meyer, Andreas Pashalidis
    Pages 1-16
  3. A Fresh Look at the Generalised Mix Framework

    • Andrei Serjantov
    Pages 17-29
  4. Two-Sided Statistical Disclosure Attack

    • George Danezis, Claudia Diaz, Carmela Troncoso
    Pages 30-44
  5. Louis, Lester and Pierre: Three Protocols for Location Privacy

    • Ge Zhong, Ian Goldberg, Urs Hengartner
    Pages 62-76
  6. Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker

    • Markulf Kohlweiss, Sebastian Faust, Lothar Fritsch, Bartek Gedrojc, Bart Preneel
    Pages 77-94
  7. Pairing-Based Onion Routing

    • Aniket Kate, Greg Zaverucha, Ian Goldberg
    Pages 95-112
  8. Nymble: Anonymous IP-Address Blocking

    • Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
    Pages 113-133
  9. Identity Trail: Covert Surveillance Using DNS

    • Saikat Guha, Paul Francis
    Pages 153-166
  10. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries

    • Steven J. Murdoch, Piotr ZieliÅ„ski
    Pages 167-183
  11. Browser-Based Attacks on Tor

    • Timothy G. Abbott, Katherine J. Lai, Michael R. Lieberman, Eric C. Price
    Pages 184-199
  12. Enforcing P3P Policies Using a Digital Rights Management System

    • Farzad Salim, Nicholas Paul Sheppard, Rei Safavi-Naini
    Pages 200-217
  13. Performance Comparison of Low-Latency Anonymisation Services from a User Perspective

    • Rolf Wendolsky, Dominik Herrmann, Hannes Federrath
    Pages 233-253
  14. Back Matter

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access