Ebook: Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
Author: Craig Gentry Kenny A. Goldman Shai Halevi (auth.) Emiliano De Cristofaro Matthew Wright (eds.)
- Tags: Data Encryption, Computer Communication Networks, Systems and Data Security, Management of Computing and Information Systems, Computers and Society, Algorithm Analysis and Problem Complexity
- Series: Lecture Notes in Computer Science 7981
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
Content:
Front Matter....Pages -
Optimizing ORAM and Using It Efficiently for Secure Computation....Pages 1-18
Anonymity-Preserving Public-Key Encryption: A Constructive Approach....Pages 19-39
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems....Pages 40-59
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error....Pages 60-81
Broadening the Scope of Differential Privacy Using Metrics....Pages 82-102
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet....Pages 103-122
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots....Pages 123-142
The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting....Pages 143-163
How Low Can You Go: Balancing Performance with Anonymity in Tor....Pages 164-184
OSS: Using Online Scanning Services for Censorship Circumvention....Pages 185-204
The Need for Flow Fingerprints to Link Correlated Network Flows....Pages 205-224
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness....Pages 225-244
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards....Pages 245-264
Back Matter....Pages -
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.
Content:
Front Matter....Pages -
Optimizing ORAM and Using It Efficiently for Secure Computation....Pages 1-18
Anonymity-Preserving Public-Key Encryption: A Constructive Approach....Pages 19-39
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems....Pages 40-59
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error....Pages 60-81
Broadening the Scope of Differential Privacy Using Metrics....Pages 82-102
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet....Pages 103-122
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots....Pages 123-142
The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting....Pages 143-163
How Low Can You Go: Balancing Performance with Anonymity in Tor....Pages 164-184
OSS: Using Online Scanning Services for Censorship Circumvention....Pages 185-204
The Need for Flow Fingerprints to Link Correlated Network Flows....Pages 205-224
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness....Pages 225-244
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards....Pages 245-264
Back Matter....Pages -
....