HOME > Detail View

Detail View

Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings

Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings

Material type
단행본
Personal Author
Federrath, Hannes.
Title Statement
Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings / Hannes Federrath (ed.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   2001.  
Physical Medium
x, 230 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science ;2009
ISBN
3540417249 (softcover : alk. paper)
General Note
Also available via the World Wide Web.
Bibliography, Etc. Note
Includes bibliographical references and index.
이용가능한 다른형태자료
Also available via the World Wide Web.  
Subject Added Entry-Topical Term
Computer security -- Congresses. Computer networks -- Security measures -- Congresses.
Short cut
URL Restricted to Springer LINK subscribers  
000 01387camuu22003014a 4500
001 000000772451
005 20091124144708
008 010207s2001 nyua b 101 0 eng
010 ▼a 2001020339
020 ▼a 3540417249 (softcover : alk. paper)
040 ▼a DLC ▼c DLC ▼d OHX ▼d CUS ▼d C#P ▼d UKM ▼d C$Q ▼d LVB ▼d 211009
042 ▼a pcc
049 1 ▼l 111198359
050 0 0 ▼a QA76.9.A25 ▼b I563 2000
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I618d
111 2 ▼a International Workshop on Design Issues in Anonymity and Unobservability ▼d (2000 : ▼c Berkeley, Calif.)
245 1 0 ▼a Designing privacy enhancing technologies : ▼b International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings / ▼c Hannes Federrath (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c 2001.
300 ▼a x, 230 p. : ▼b ill. ; ▼c 24 cm.
440 0 ▼a Lecture notes in computer science ; ▼v 2009
504 ▼a Includes bibliographical references and index.
530 ▼a Also available via the World Wide Web.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
700 1 ▼a Federrath, Hannes.
856 4 1 ▼u http://link.springer-ny.com/link/service/series/0558/tocs/t2009.htm ▼z Restricted to Springer LINK subscribers

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Main Library/Western Books/ Call Number 005.8 I618d Accession No. 111198359 Availability Available Due Date Make a Reservation Service B M

Contents information

Book Introduction

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.
This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.
This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.


Information Provided By: : Aladin

Table of Contents

Terminology.- Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology.- Attacks on Systems.- Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems.- The Disadvantages of Free MIX Routes and How to Overcome Them.- Anonymous Publishing.- Freenet: A Distributed Anonymous Information Storage and Retrieval System.- The Free Haven Project: Distributed Anonymous Storage Service.- Mix Systems.- Towards an Analysis of Onion Routing Security.- Web MIXes: A System for Anonymous and Unobservable Internet Access.- Identity Management.- Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age.- Identity Management Based on P3P.- Pseudonyms and Remailers.- On Pseudonymization of Audit Data for Intrusion Detection.- Protection Profiles for Remailer Mixes.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Harvard Business Review (2025)