Privacy enhancing technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2006
|
Schriftenreihe: | Lecture notes in computer science
4258 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis Klappentext |
Beschreibung: | VIII, 429 S. Ill., graph. Darst. |
ISBN: | 9783540687900 3540687904 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV022263391 | ||
003 | DE-604 | ||
005 | 20170306 | ||
007 | t| | ||
008 | 070208s2006 gw ad|| |||| 10||| eng d | ||
015 | |a 06,N51,0036 |2 dnb | ||
016 | 7 | |a 982031572 |2 DE-101 | |
020 | |a 9783540687900 |c : ca. EUR 59.92 (freier Pr.), ca. sfr 99.00 (freier Pr.) |9 978-3-540-68790-0 | ||
020 | |a 3540687904 |c : ca. EUR 59.92 (freier Pr.), ca. sfr 99.00 (freier Pr.) |9 3-540-68790-4 | ||
024 | 3 | |a 9783540687900 | |
028 | 5 | 2 | |a 11957454 |
035 | |a (OCoLC)635091932 | ||
035 | |a (DE-599)BVBBV022263391 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-91G |a DE-706 |a DE-355 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Privacy enhancing technologies |b 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |c George Danezis ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2006 | |
300 | |a VIII, 429 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 4258 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymität |0 (DE-588)4471050-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2006 |z Cambridge |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 2 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 2 | 1 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 2 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 2 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Danezis, George |e Sonstige |4 oth | |
711 | 2 | |a PET |n 6 |d 2006 |c Cambridge |j Sonstige |0 (DE-588)6514102-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 4258 |w (DE-604)BV000000607 |9 4258 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2877221&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-015473995 |
Datensatz im Suchindex
_version_ | 1820875005573988352 |
---|---|
adam_text |
Table
of
Contents
6th Workshop on Privacy Enhancing Technologies
Privacy for Public Transportation
. 1
Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and
Kevin
Fu
Ignoring the Great Firewall of China
. 20
Richard Clayton, Steven J. Murdoch, and Robert
N.M.
Watson
Imagined Communities: Awareness, Information Sharing, and Privacy
on the Facebook
. 36
Alessandro Acquisti
and Ralph Gross
Enhancing Consumer Privacy in the Liberty Alliance Identity
Federation and Web Services Frameworks
. 59
Mans our Ahaleh and Carlisle Adams
Traceable and Automatic Compliance of Privacy Policies in Federated
Digital Identity Management
. 78
Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, and
Elisa
Bertino
Privacy Injector
—
Automated Privacy Enforcement Through
Aspects
. 99
Chris
Vanden
Berghe and Matthias Schunter
A Systemic Approach to Automate Privacy Policy Enforcement
in Enterprises
. 118
Marco Casassa Mont and Robert Thyne
One Big File Is Not Enough: A Critical Evaluation of the Dominant
Free-Space Sanitization Technique
. 135
Simson
L.
Garfinkel and David J. Malan
Protecting Privacy with the MPEG-21 IPMP Framework
. 152
Nicholas Paul Sheppard and Reihaneh Safavi-Naini
Personal Rights Management
-
Taming Camera-Phones for Individual
Privacy Enforcement
. 172
Mina
Deng,
Lothar
Fritsch, and Klaus Kursawe
Improving Sender Anonymity in a Structured Overlay with Imprecise
Routing
. 190
Giuseppe Ciaccio
VIH
Table of Contents
Selectively Traceable Anonymity
. 208
Luis von Ahn,
Andrew Bortz, Nicholas J. Hopper, and
Kevin O'Neill
Valet Services: Improving Hidden Servers with a Personal Touch
. 223
Lasse 0verlier
and Paul Syverson
Blending Different Latency Traffic with Alpha-mixing
. 245
Roger Dingledine, Andrei Serjantov, and Paul Syverson
Private Resource Pairing
. 258
Joseph
A. Calandrino
and Alfred C. Weaver
Honest-Verifier Private Disjointness Testing Without Random
Oracles
. 277
Susan Hohenberger and Stephen A.
Weis
A Flexible Framework for Secret Handshakes (Multi-party Anonymous
and Un-observable Authentication)
. 295
Gene Tsudik and Shouhuai Xu
On the Security of the Tor Authentication Protocol
. 316
Ian Goldberg
Optimal Key-Trees for Tree-Based Private Authentication
. 332
Levente
Buttyán, Tamás Holczer,
and
István Vajda
Simple and Flexible Revocation Checking with Privacy
. 351
John
Solis
and Gene Tsudik
Breaking the Collusion Detection Mechanism of MorphMix
. 368
Parisa
Tabriz and Nikita
Borisov
Linking Anonymous Transactions: The Consistent View Attack
. 384
Andreas Pashalidis and
Bernd
Meyer
Preserving User Location Privacy in Mobile Data Management
Infrastructures
. 393
Reynold Cheng, Yu Zhang,
Elisa
Bertino,
and Sunil Prabhakar
The Effects of Location Access Behavior on Re-
identificat
ion Risk
in a Distributed Environment
. 413
Bradley
Malin
and
Edoardo Airoldi
Author Index
. 431
Lecture Notes in Computer Science
The LNCS
series
reports
state-of-the-art results in
computer science
research, development, and education, at a high level and in both printed
and electronic form. Enjoying tight cooperation with the R&D community,
with numerous individuals, as well as with prestigious organizations and
societies, LNCS has grown into the most comprehensive computer science
research forum available.
The scope of LNCS, including its subseries LNAI and LNBI, spans the
whole range of computer science and information technology including
interdisciplinary topics in a variety of application fields. The type of
material published traditionally includes
-
proceedings (published in time for the respective conference)
-
post-proceedings (consisting of thoroughly revised final full papers)
-
research monographs (which may be based on outstanding PhD work,
research projects, technical reports, etc.)
More reçeaîiy,
several
ćołor-co^er
stíblmes
bave
been added featuring*
befoad a collecttorn of papers,
гшот.
auéea-mím
components; these.
stibłmes
iadbđe
·-
ЫШЫ$
{textbook-iífce naonogfsfihs €?r
collections
pffectíires gi¥#n
at
advaoced
сошгѕеѕ)
pfâtopíc)
bot
topics.
(ííitro
Jadîïg
eniergísit
fepics-
1© f
ће
broader
¿©їшрішіуі
té
Ще
pi'mi&abùù%eaai mw
veterné
&
вИаа-'
. · ■ ·'.■■' ■.
Betúltà
'ЫЬшФш
om ŁNCS
coa be
îounâ
at
ger.çôm/faics
for
piłbHcatmiisbotila
be seat to |
adam_txt |
Table
of
Contents
6th Workshop on Privacy Enhancing Technologies
Privacy for Public Transportation
. 1
Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and
Kevin
Fu
Ignoring the Great Firewall of China
. 20
Richard Clayton, Steven J. Murdoch, and Robert
N.M.
Watson
Imagined Communities: Awareness, Information Sharing, and Privacy
on the Facebook
. 36
Alessandro Acquisti
and Ralph Gross
Enhancing Consumer Privacy in the Liberty Alliance Identity
Federation and Web Services Frameworks
. 59
Mans our Ahaleh and Carlisle Adams
Traceable and Automatic Compliance of Privacy Policies in Federated
Digital Identity Management
. 78
Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, and
Elisa
Bertino
Privacy Injector
—
Automated Privacy Enforcement Through
Aspects
. 99
Chris
Vanden
Berghe and Matthias Schunter
A Systemic Approach to Automate Privacy Policy Enforcement
in Enterprises
. 118
Marco Casassa Mont and Robert Thyne
One Big File Is Not Enough: A Critical Evaluation of the Dominant
Free-Space Sanitization Technique
. 135
Simson
L.
Garfinkel and David J. Malan
Protecting Privacy with the MPEG-21 IPMP Framework
. 152
Nicholas Paul Sheppard and Reihaneh Safavi-Naini
Personal Rights Management
-
Taming Camera-Phones for Individual
Privacy Enforcement
. 172
Mina
Deng,
Lothar
Fritsch, and Klaus Kursawe
Improving Sender Anonymity in a Structured Overlay with Imprecise
Routing
. 190
Giuseppe Ciaccio
VIH
Table of Contents
Selectively Traceable Anonymity
. 208
Luis von Ahn,
Andrew Bortz, Nicholas J. Hopper, and
Kevin O'Neill
Valet Services: Improving Hidden Servers with a Personal Touch
. 223
Lasse 0verlier
and Paul Syverson
Blending Different Latency Traffic with Alpha-mixing
. 245
Roger Dingledine, Andrei Serjantov, and Paul Syverson
Private Resource Pairing
. 258
Joseph
A. Calandrino
and Alfred C. Weaver
Honest-Verifier Private Disjointness Testing Without Random
Oracles
. 277
Susan Hohenberger and Stephen A.
Weis
A Flexible Framework for Secret Handshakes (Multi-party Anonymous
and Un-observable Authentication)
. 295
Gene Tsudik and Shouhuai Xu
On the Security of the Tor Authentication Protocol
. 316
Ian Goldberg
Optimal Key-Trees for Tree-Based Private Authentication
. 332
Levente
Buttyán, Tamás Holczer,
and
István Vajda
Simple and Flexible Revocation Checking with Privacy
. 351
John
Solis
and Gene Tsudik
Breaking the Collusion Detection Mechanism of MorphMix
. 368
Parisa
Tabriz and Nikita
Borisov
Linking Anonymous Transactions: The Consistent View Attack
. 384
Andreas Pashalidis and
Bernd
Meyer
Preserving User Location Privacy in Mobile Data Management
Infrastructures
. 393
Reynold Cheng, Yu Zhang,
Elisa
Bertino,
and Sunil Prabhakar
The Effects of Location Access Behavior on Re-
identificat
ion Risk
in a Distributed Environment
. 413
Bradley
Malin
and
Edoardo Airoldi
Author Index
. 431
Lecture Notes in Computer Science
The LNCS
series
reports
state-of-the-art results in
computer science
research, development, and education, at a high level and in both printed
and electronic form. Enjoying tight cooperation with the R&D community,
with numerous individuals, as well as with prestigious organizations and
societies, LNCS has grown into the most comprehensive computer science
research forum available.
The scope of LNCS, including its subseries LNAI and LNBI, spans the
whole range of computer science and information technology including
interdisciplinary topics in a variety of application fields. The type of
material published traditionally includes
-
proceedings (published in time for the respective conference)
-
post-proceedings (consisting of thoroughly revised final full papers)
-
research monographs (which may be based on outstanding PhD work,
research projects, technical reports, etc.)
More reçeaîiy,
several
ćołor-co^er
stíblmes
bave
been added featuring*
befoad a collecttorn of papers,
гшот.
auéea-mím
components; these.
stibłmes
iadbđe
·-
ЫШЫ$
{textbook-iífce naonogfsfihs €?r
collections
pffectíires gi¥#n
at
advaoced
сошгѕеѕ)
pfâtopíc)
bot
topics.
(ííitro
Jadîïg
eniergísit
fepics-
1© f
ће
broader
¿©їшрішіуі
té
Ще
pi'mi&abùù%eaai mw
veterné
&
вИаа-'
. · ■ ·'.■■' ■.
Betúltà
'ЫЬшФш
om ŁNCS
coa be
îounâ
at
ger.çôm/faics
for
piłbHcatmiisbotila
be seat to |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022263391 |
classification_rvk | ST 276 |
classification_tum | DAT 461f DAT 050f |
ctrlnum | (OCoLC)635091932 (DE-599)BVBBV022263391 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV022263391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170306</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">070208s2006 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,N51,0036</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">982031572</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540687900</subfield><subfield code="c">: ca. EUR 59.92 (freier Pr.), ca. sfr 99.00 (freier Pr.)</subfield><subfield code="9">978-3-540-68790-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540687904</subfield><subfield code="c">: ca. EUR 59.92 (freier Pr.), ca. sfr 99.00 (freier Pr.)</subfield><subfield code="9">3-540-68790-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540687900</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11957454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)635091932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022263391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy enhancing technologies</subfield><subfield code="b">6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers</subfield><subfield code="c">George Danezis ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 429 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">4258</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2006</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Danezis, George</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">PET</subfield><subfield code="n">6</subfield><subfield code="d">2006</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6514102-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">4258</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">4258</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2877221&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015473995</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2006 Cambridge gnd-content |
genre_facet | Konferenzschrift 2006 Cambridge |
id | DE-604.BV022263391 |
illustrated | Illustrated |
index_date | 2024-07-02T16:43:31Z |
indexdate | 2025-01-10T15:08:45Z |
institution | BVB |
institution_GND | (DE-588)6514102-7 |
isbn | 9783540687900 3540687904 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015473995 |
oclc_num | 635091932 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-355 DE-BY-UBR DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-355 DE-BY-UBR DE-83 |
physical | VIII, 429 S. Ill., graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers George Danezis ... (eds.) Berlin [u.a.] Springer 2006 VIII, 429 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 4258 Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Anonymität (DE-588)4471050-1 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2006 Cambridge gnd-content Internet (DE-588)4308416-3 s Privatsphäre (DE-588)4123980-5 s Anonymität (DE-588)4471050-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s Netzwerkverwaltung (DE-588)4314339-8 s Authentifikation (DE-588)4330656-1 s Kryptoanalyse (DE-588)4830502-9 s Danezis, George Sonstige oth PET 6 2006 Cambridge Sonstige (DE-588)6514102-7 oth Lecture notes in computer science 4258 (DE-604)BV000000607 4258 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2877221&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymität (DE-588)4471050-1 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4471050-1 (DE-588)4314339-8 (DE-588)1071861417 |
title | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |
title_auth | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |
title_exact_search | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |
title_exact_search_txtP | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |
title_full | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers George Danezis ... (eds.) |
title_fullStr | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers George Danezis ... (eds.) |
title_full_unstemmed | Privacy enhancing technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers George Danezis ... (eds.) |
title_short | Privacy enhancing technologies |
title_sort | privacy enhancing technologies 6th international workshop pet 2006 cambridge uk june 28 30 2006 revised selected papers |
title_sub | 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006 ; revised selected papers |
topic | Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymität (DE-588)4471050-1 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Datensicherung Authentifikation Privatsphäre Internet Kryptoanalyse Computersicherheit Anonymität Netzwerkverwaltung Konferenzschrift 2006 Cambridge |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2877221&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015473995&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT danezisgeorge privacyenhancingtechnologies6thinternationalworkshoppet2006cambridgeukjune28302006revisedselectedpapers AT petcambridge privacyenhancingtechnologies6thinternationalworkshoppet2006cambridgeukjune28302006revisedselectedpapers |