Lecture Notes in Computer Science 4258

Size: px
Start display at page:

Download "Lecture Notes in Computer Science 4258"

Transcription

1 Lecture Notes in Computer Science 4258 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

2 George Danezis Philippe Golle (Eds.) Privacy Enhancing Technologies 6th International Workshop, PET 2006 Cambridge, UK, June 28-30, 2006 Revised Selected Papers 13

3 Volume Editors George Danezis Katholieke Universiteit Leuven Kasteelpark Arenberg 10 B-3001 Leuven-Heverlee, Belgium Philippe Golle Palo Alto Research Center 3333 Coyote Hill Rd Palo Alto, CA 94304, USA Library of Congress Control Number: CR Subject Classification (1998): E.3, C.2, D.4.6, K.6.5, K.4, H.3, H.4 LNCS Sublibrary: SL 4 Security and Cryptology ISSN ISBN Springer Berlin Heidelberg New York ISBN Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: /

4 Foreword The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK), on June 28 30, The workshop received 91 full paper submissions out of which 24 were selected for presentation. As a rule, papers were reviewed by 3 independent members of the Program Committee, and often also by external reviewers. A further two-week long online discussion took place amongst the PC to reach consensus on all submissions. The ultimate responsibility for the final selection of papers rests on the program chairs. The ratio of acceptance puts PET in league with other premiere computer security venues, and guarantees a high quality scientific program. Yet PET also retains its character as a workshop, by providing a venue where promising new ideas can be presented and discussed by the privacy community. Identifying high quality, as well as high potential, submissions was a difficult balancing act. The program chairs would like to thank the Program Committee of PET 2006 for their invaluable work in helping select the best submissions: - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Mikhail Atallah, Purdue University, USA - Michael Backes, Saarland University, Germany - Alastair Beresford, University of Cambridge, UK - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Jan Camenisch, IBM Zurich Research Laboratory, Switzerland - Kim Cameron, Microsoft, USA - Fred Cate, Indiana University at Bloomington, USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Simone Fischer-Hübner, Karlstad University, Sweden - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA - Dennis Kügler, Federal Office for Information Security, Germany - Brian Levine, University of Massachusetts at Amherst, USA - David Molnar, University of California at Berkeley, USA - Andreas Pfitzmann, Dresden University of Technology, Germany - Mike Reiter, Carnegie Mellon University, USA - Andrei Serjantov, The Free Haven Project, UK - Paul Syverson, Naval Research Lab, USA - Matthew Wright, University of Texas at Arlington, USA Additional reviewers included Christer Andersson, Marina Blanton, Katrin Borcea-Pfitzmann, Sebastian Clauß, Richard Clayton, Hatim Daginawala,

5 VI Preface Markus Duermuth, Nick Feamster, Keith Frikken, Rachel Greenstadt, Thomas Heydt-Benjamin, Ari Juels, Lea Kissner, Stefan Köpsell, Klaus K. Kursawe, Pil Joong Lee, Jiangtao Li, Katja Liesebach, Leonardo A. Martucci, Nick Mathewson, Steven J. Murdoch, Gregory Neuven, Amit Sahai, Antje Schneidewind, Dagmar Schufeld, Sid Stamm, Sandra Steinbrecher, Madhu Venkateshaiah, and Lasse Øverlier. Their help was very much appreciated. We are especially grateful to our General Chair, Richard Clayton, from the University of Cambridge Computer Laboratory, for taking care of all local arrangements. Thomas Herlea, from the K.U. Leuven, was kind enough to help us with the online submission and reviewing system. PET 2006 was collocated with two events. WEIS 2006, the Workshop on the Economics of Information Security, shared a session with PET on the economics of privacy and surveillance. We are very grateful to Ross Anderson, WEIS Chair, and Tyler Moore, WEIS General Chair, who took care of local arrangements, for their help in coordinating the two events. Secondly, WOTE 2006, the Workshop on Trustworthy Elections, coordinated by Peter Ryan, shared the last two days of the workshop. Participants of both workshops were free to circulate between all sessions, and social activities during the day were shared to maximize the synergy between the two communities. PET 2006 was made possible, and more affordable, thanks to the continuing generous sponsorship of Microsoft. We are particularly indebted to Caspar Bowden and JC Cannon, who actively contributed to the success of the workshop by providing this sponsorship and support. Roger Dingledine was kind enough to manage and distribute the stipends to those participants who needed them. The PET prize, sponsored by Microsoft and the Office of the Information and Privacy Commissioner of Ontario, was this year awarded through an independent prize committee headed by Alessandro Acquisti, to whom we are thankful. The 2006 prize was awarded to Daniel Solove for his paper entitled A Taxonomy of Privacy. The award ceremony took place at Microsoft Research Cambridge, along with live demonstrations of privacy technology. October 2006 George Danezis and Philippe Golle Program Chairs PET 2006

6 Table of Contents 6 th Workshop on Privacy Enhancing Technologies Privacy for Public Transportation... 1 Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N.M. Watson Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook Alessandro Acquisti and Ralph Gross Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks Mansour Alsaleh and Carlisle Adams Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, and Elisa Bertino Privacy Injector Automated Privacy Enforcement Through Aspects Chris Vanden Berghe and Matthias Schunter A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises Marco Casassa Mont and Robert Thyne One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique Simson L. Garfinkel and David J. Malan Protecting Privacy with the MPEG-21 IPMP Framework Nicholas Paul Sheppard and Reihaneh Safavi-Naini Personal Rights Management Taming Camera-Phones for Individual Privacy Enforcement Mina Deng, Lothar Fritsch, and Klaus Kursawe Improving Sender Anonymity in a Structured Overlay with Imprecise Routing Giuseppe Ciaccio

7 VIII Table of Contents Selectively Traceable Anonymity Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, and Kevin O Neill Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier and Paul Syverson Blending Different Latency Traffic with Alpha-mixing Roger Dingledine, Andrei Serjantov, and Paul Syverson Private Resource Pairing Joseph A. Calandrino and Alfred C. Weaver Honest-Verifier Private Disjointness Testing Without Random Oracles Susan Hohenberger and Stephen A. Weis A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication) Gene Tsudik and Shouhuai Xu On the Security of the Tor Authentication Protocol Ian Goldberg Optimal Key-Trees for Tree-Based Private Authentication Levente Buttyán, Tamás Holczer, and István Vajda Simple and Flexible Revocation Checking with Privacy John Solis and Gene Tsudik Breaking the Collusion Detection Mechanism of MorphMix Parisa Tabriz and Nikita Borisov Linking Anonymous Transactions: The Consistent View Attack Andreas Pashalidis and Bernd Meyer Preserving User Location Privacy in Mobile Data Management Infrastructures Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment Bradley Malin and Edoardo Airoldi Author Index

Lecture Notes in Computer Science 7323

Lecture Notes in Computer Science 7323 Lecture Notes in Computer Science 7323 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 5454

Lecture Notes in Computer Science 5454 Lecture Notes in Computer Science 5454 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 5742

Lecture Notes in Computer Science 5742 Lecture Notes in Computer Science 5742 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 3130

Lecture Notes in Computer Science 3130 Lecture Notes in Computer Science 3130 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 3933

Lecture Notes in Computer Science 3933 Lecture Notes in Computer Science 3933 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Advances in Artificial Reality and Tele-Existence

Advances in Artificial Reality and Tele-Existence Zhigeng Pan Adrian Cheok Michael Haller Rynson W.H. Lau Hideo Saito Ronghua Liang (Eds.) Advances in Artificial Reality and Tele-Existence 16th International Conference on Artificial Reality and Telexistence,

More information

Lecture Notes in Computer Science 3293

Lecture Notes in Computer Science 3293 Lecture Notes in Computer Science 3293 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 6227

Lecture Notes in Computer Science 6227 Lecture Notes in Computer Science 6227 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 8945

Lecture Notes in Computer Science 8945 Lecture Notes in Computer Science 8945 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 6585

Lecture Notes in Computer Science 6585 Lecture Notes in Computer Science 6585 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Gul A. Agha Fiorella De Cindio

More information

Lecture Notes in Computer Science 5884

Lecture Notes in Computer Science 5884 Lecture Notes in Computer Science 5884 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC Web Archiving Julien Masanès Web Archiving With 28 Figures and 6 Tables ABC Author Julien Masanès European Web Archive 25 rue des envierges 75020 Paris, France julien.masanes@bnf.fr ACM Computing Classification

More information

High Availability and Disaster Recovery

High Availability and Disaster Recovery High Availability and Disaster Recovery Klaus Schmidt High Availability and Disaster Recovery Concepts, Design, Implementation With 83 Figures and 26 Tables 123 Klaus Schmidt Stockheimer Str. 20 60385

More information

Lecture Notes in Computer Science 3427

Lecture Notes in Computer Science 3427 Lecture Notes in Computer Science 3427 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Overview. Passive Load. Measurement. Classification. Setup. Future Work

Overview. Passive Load. Measurement. Classification. Setup. Future Work Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia Overview Passive Load Cloud providers often

More information

Automated and Algorithmic Debugging

Automated and Algorithmic Debugging Peter A. Fritzson (Ed.) Automated and Algorithmic Debugging First International Workshop, AADEBUG '93 LinkiSping, Sweden, May 3-5, 1993 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 371 I D. Hammer (Ed.) Compiler Compilers and High Speed Compilation 2rid CCHSC Workshop Berlin, GDR, October 10-14, 1988 Proceedings

More information

Lecture Notes in Computer Science 3279

Lecture Notes in Computer Science 3279 Lecture Notes in Computer Science 3279 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Geometric Modeling and Algebraic Geometry

Geometric Modeling and Algebraic Geometry Geometric Modeling and Algebraic Geometry Bert Jüttler Ragni Piene Editors Geometric Modeling and Algebraic Geometry 123 Bert Jüttler Institute of Applied Geometry Johannes Kepler University Altenberger

More information

Interfacing with C++

Interfacing with C++ Interfacing with C++ Jayantha Katupitiya Kim Bentley Interfacing with C++ Programming Real-World Applications ABC Dr. Jayantha Katupitiya Senior Lecturer School of Mechanical and Manufacturing Engineering

More information

Lecture Notes in Computer Science 3604

Lecture Notes in Computer Science 3604 Lecture Notes in Computer Science 3604 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Real-Time Graphics Rendering Engine

Real-Time Graphics Rendering Engine Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang

More information

Social Networking for Anonymous Communication Systems: A Survey

Social Networking for Anonymous Communication Systems: A Survey Social Networking for Anonymous Communication Systems: A Survey Rodolphe Marques Instituto de Telecomunicações Aveiro, Portugal rmarques@av.it.pt André Zúquete Universidade de Aveiro/IEETA Aveiro, Portugal

More information

Lecture Notes in Computer Science 1506 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 1506 Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science 1506 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Reinhard Koch Luc Van Gool

More information

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such

More information

Object-Based Concurrent Computing

Object-Based Concurrent Computing M. Tokoro O. Nierstrasz E Wegner (Eds.) Object-Based Concurrent Computing ECOOP '91 Workshop Geneva, Switzerland, July 15-16, 1991 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris Tokyo

More information

Lecture Notes in Business Information Processing 67

Lecture Notes in Business Information Processing 67 Lecture Notes in Business Information Processing 67 Series Editors Wil van der Aalst Eindhoven Technical University, The Netherlands John Mylopoulos University of Trento, Italy Michael Rosemann Queensland

More information

Towards measuring anonymity

Towards measuring anonymity Towards measuring anonymity Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 0, B-300 Leuven-Heverlee, Belgium claudia.diaz@esat.kuleuven.ac.be http://www.esat.kuleuven.ac.be/cosic/

More information

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1605 Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Jonathan Billington

More information

Nonesuch: a Mix Network with Sender Unobservability

Nonesuch: a Mix Network with Sender Unobservability Nonesuch: a Mix Network with Sender Unobservability Thomas S. Heydt-Benjamin University of Massachusetts at Amherst tshb@cs.umass.edu Andrei Serjantov The Freehaven Project schnur@gmail.com Benessa Defend

More information

Bridging and Fingerprinting: Epistemic Attacks on Route Selection

Bridging and Fingerprinting: Epistemic Attacks on Route Selection Bridging and Fingerprinting: Epistemic Attacks on Route Selection George Danezis 1 and Paul Syverson 2 1 Microsoft Research, Cambridge, UK. 2 Naval Research Laboratory, USA. Abstract. Users building routes

More information

Don t clog the queue!

Don t clog the queue! Don t clog the queue! Circuit clogging and mitigation in P2P anonymity schemes Jon McLachlan and Nicholas Hopper Computer Science & Engineering, University of Minnesota, Minneapolis MN 55455 USA {hopper,jmcla}@cs.umn.edu

More information

A Recovery Approach for SQLite History Recorders from YAFFS2

A Recovery Approach for SQLite History Recorders from YAFFS2 A Recovery Approach for SQLite History Recorders from YAFFS2 Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng To cite this : Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, et al..

More information

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012 Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the

More information

Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Harrie de Swart Ewa Orłowska Gunther Schmidt Marc

More information

Lecture Notes in Computer Science 7037

Lecture Notes in Computer Science 7037 Lecture Notes in Computer Science 7037 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Anonymous Credentials through Acid Mixing

Anonymous Credentials through Acid Mixing Anonymous Credentials through Acid Mixing Alessandro Acquisti Carnegie Mellon University June 2003 Abstract Reliability and trust are open issues in the MIX-net literature. We present a variation on the

More information

Lecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris

Lecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris Lecture Notes in Mathematics 1842 Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Trygve Johnsen Andreas Leopold Knutsen

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Message Splitting Against the Partial Adversary

Message Splitting Against the Partial Adversary Message Splitting Against the Partial Adversary Andrei Serjantov and Steven J. Murdoch The Free Haven Project, UK schnur@gmail.com University of Cambridge Computer Laboratory, 5 JJ Thomson Ave, Cambridge,

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert

More information

Catching Inside Attackers

Catching Inside Attackers Catching Inside Attackers Balancing Forensic Detectability and Privacy of Employees Jens Lindemann, Ephraim Zimmer, Dominik Herrmann, Hannes Federrath October 29, 2015 2014 US state of cybercrime survey

More information

Contributions to Economics

Contributions to Economics Contributions to Economics Kesra Nermend Vector Calculus in Regional Development Analysis Comparative Regional Analysis Using the Example of Poland Physica Verlag A Springer Company Dr. inž. Kesra Nermend

More information

Network Forensics and Privacy Enhancing Technologies living together in harmony

Network Forensics and Privacy Enhancing Technologies living together in harmony Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2006 Network Forensics and Privacy Enhancing Technologies living together

More information

Detecting Computer Worms in the Cloud

Detecting Computer Worms in the Cloud Detecting Computer Worms in the Cloud Sebastian Biedermann, Stefan Katzenbeisser To cite this version: Sebastian Biedermann, Stefan Katzenbeisser. Detecting Computer Worms in the Cloud. David Hutchison;

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series editors Stan Zdonik, Brown University, Providence, Rhode Island, USA Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA Xindong Wu, University

More information

Software Development for SAP R/3

Software Development for SAP R/3 Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example

More information

Quantifying Information Leakage in Tree-Based Hash Protocols

Quantifying Information Leakage in Tree-Based Hash Protocols Quantifying Information Leakage in Tree-Based Hash Protocols Technical Report CS-- Karsten Nohl and David Evans University of Virginia Computer Science Department {nohl,evans}@cs.virginia.edu Abstract.

More information

Thirteenth International Workshop on Quality of Service (IWQoS 2005) Passau, Germany, June

Thirteenth International Workshop on Quality of Service (IWQoS 2005) Passau, Germany, June 09:00 11:00 The User Experience of QoS Session Chair: Ralf Steinmetz, Technical University of Darmstadt, Germany A Self-Tuning Fuzzy Control Approach for End-to-End QoS Guarantees in Web Servers Jianbin

More information

Lecture Notes in Artificial Intelligence 3932

Lecture Notes in Artificial Intelligence 3932 Lecture Notes in Artificial Intelligence 3932 Edited by J. G. Carbonell and J. Siekmann Subseries of Lecture Notes in Computer Science Bamshad Mobasher Olfa Nasraoui Bing Liu Brij Masand Advances in Web

More information

E-Ticketing scheme for mobile devices with exculpability

E-Ticketing scheme for mobile devices with exculpability E-Ticketing scheme for mobile devices with exculpability Arnau Vives-Guasch 1, Magdalena Payeras-Capella 2, Macià Mut-Puigserver 2 and Jordi Castellà-Roca 1 1 Dept. de Ingeniería Informática y Matemáticas

More information

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial With 163 Figures Author Prof. Dr. Gengsheng Lawrence

More information

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs A Simplified Privacy Preserving Message Delivery Protocol in VDTNs Youngho Park, Chul Sur, Kyung-Hyune Rhee To cite this version: Youngho Park, Chul Sur, Kyung-Hyune Rhee. A Simplified Privacy Preserving

More information

Blending different latency traffic with alpha-mixing

Blending different latency traffic with alpha-mixing Blending different latency traffic with alpha-mixing Roger Dingledine 1, Andrei Serjantov 2, and Paul Syverson 3 1 The Free Haven Project (arma@freehaven.net) 2 The Free Haven Project (aas23@freehaven.net)

More information

Computer Architecture

Computer Architecture Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta

More information

Grid Computing Security

Grid Computing Security Grid Computing Security Anirban Chakrabarti Grid Computing Security With 87 Figures and 12 Tables 123 Anirban Chakrabarti Infosys Technologies Limited Electronic City Hosur Road 560100 Bangalore India

More information

Overview Scrollbar: A Scrollbar Showing an Entire Document as an Overview

Overview Scrollbar: A Scrollbar Showing an Entire Document as an Overview Overview Scrollbar: A Scrollbar Showing an Entire Document as an Overview Ko Mizoguchi, Daisuke Sakamoto, Takeo Igarashi To cite this version: Ko Mizoguchi, Daisuke Sakamoto, Takeo Igarashi. Overview Scrollbar:

More information

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis

More information

Business Process Models

Business Process Models LNCS 7849 Christian Gerth Business Process Models Change Management 123 Lecture Notes in Computer Science 7849 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis,

More information

Digital Preservation Metadata for Practitioners

Digital Preservation Metadata for Practitioners Digital Preservation Metadata for Practitioners Angela Dappert Rebecca Squire Guenther Sébastien Peyrard Editors Digital Preservation Metadata for Practitioners Implementing PREMIS 123 Editors Angela Dappert

More information

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks Mohammed Bahria, Alexis Olivereau, Aymen Boudguiga To cite this version: Mohammed Bahria, Alexis Olivereau,

More information

Big Data - Security with Privacy

Big Data - Security with Privacy Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,

More information

CAPTCHA Suitable for Smartphones

CAPTCHA Suitable for Smartphones CAPTCHA Suitable for Smartphones Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura To cite this version: Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura. CAPTCHA Suitable for Smartphones. David Hutchison;

More information

Philipp von Weitershausen. Web Component Development with Zope 3

Philipp von Weitershausen. Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 With 39 Figures and 10 Tables 123 Philipp von Weitershausen Goebenstraße

More information

c-xsc R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch A C++ Class Library for Extended Scientific Computing Springer-Verlag Berlin Heidelberg GmbH

c-xsc R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch A C++ Class Library for Extended Scientific Computing Springer-Verlag Berlin Heidelberg GmbH R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch c-xsc A C++ Class Library for Extended Scientific Computing Translated by G. F. Corliss C. Lawo R. Klatte A. Wiethoff C. Wolff Springer-Verlag Berlin Heidelberg

More information

Onion services. Philipp Winter Nov 30, 2015

Onion services. Philipp Winter Nov 30, 2015 Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based

More information

How to Bypass Two Anonymity Revocation Schemes

How to Bypass Two Anonymity Revocation Schemes How to Bypass Two Anonymity Revocation Schemes George Danezis 1 and Len Sassaman 2 1 Microsoft Research, Cambridge, UK gdane@microsoft.com 2 K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee,

More information

COST TO DEFEAT THE N-1 ATTACK. Neil Chettiar

COST TO DEFEAT THE N-1 ATTACK. Neil Chettiar COST TO DEFEAT THE -1 ATTAC eil Chettiar The -1 Attack MIX Different Variations: Threshold Mixes Timed Mixes Pool Mixes Attacks are Exact and Certain. Basic idea: Attacker should be able to account for

More information

The Information Retrieval Series. Series Editor W. Bruce Croft

The Information Retrieval Series. Series Editor W. Bruce Croft The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack Available online at www.sciencedirect.com Procedia Computer Science 17 (2013 ) 836 843 Information Technology and Quantitative Management, ITQM 2013 Towards Analyzing and Improving Service Accessibility

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science L.. Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 60 M. J. Flynn, J. N. Gray, A. K. Jones, K. Lagally H. Opderbeck, G. J. Popek, B. Randell J. H. Saltzer, H. R. Wiehle Operating

More information

The New Cell-Counting-Based Against Anonymous Proxy

The New Cell-Counting-Based Against Anonymous Proxy The New Cell-Counting-Based Against Anonymous Proxy Yadarthugalla Raju M.Tech Student, Department of CSE, Dr.K.V.S.R.I.T, Kurnool. K. Pavan Kumar Assistant Professor, Department of IT, Dr.K.V.S.R.I.T,

More information

Breaking the Collusion Detection Mechanism of MorphMix

Breaking the Collusion Detection Mechanism of MorphMix Breaking the Collusion Detection Mechanism of MorphMix Parisa Tabriz and Nikita Borisov University of Illinois at Urbana-Champaign {tabriz, nikita}@uiuc.edu Abstract. MorphMix is a peer-to-peer circuit-based

More information

Tor Experimentation Tools

Tor Experimentation Tools Tor Experimentation Tools Fatemeh Shirazi TU Darmstadt / KU Leuven Darmstadt, Germany fshirazi@cdc.informatik.tu-darmstadt.de Matthias Göhring TU Darmstadt Darmstadt, Germany de.m.goehring@ieee.org Claudia

More information

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi

More information

A Review of Security Attacks on the GSM Standard

A Review of Security Attacks on the GSM Standard A Review of Security Attacks on the GSM Standard Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo To cite this version: Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo.

More information

Parallel Programming

Parallel Programming Parallel Programming Thomas Rauber Gudula Rünger Parallel Programming For Multicore and Cluster Systems 123 Thomas Rauber Universität Bayreuth Computer Science Department 95440 Bayreuth Germany rauber@uni-bayreuth.de

More information

Dataflow Testing of Java Programs with DFC

Dataflow Testing of Java Programs with DFC Dataflow Testing of Java Programs with DFC Ilona Bluemke, Artur Rembiszewski To cite this version: Ilona Bluemke, Artur Rembiszewski. Dataflow Testing of Java Programs with DFC. David Hutchison; Takeo

More information

10 Years of FloCon. Prepared for FloCon George Warnagiris - CERT/CC #GeoWarnagiris Carnegie Mellon University

10 Years of FloCon. Prepared for FloCon George Warnagiris - CERT/CC #GeoWarnagiris Carnegie Mellon University 10 Years of FloCon Prepared for FloCon 2014 George Warnagiris - CERT/CC gwarnagi@cert.org #GeoWarnagiris 2014 Carnegie Mellon University Disclaimer NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 469 I I. Guessarian (Ed.) Semantics of Systems of Concurrent Processes LITP Spring School on Theoretical Computer Science La Roche Posay,

More information

Practical Traffic Analysis: Extending and Resisting Statistical Disclosure

Practical Traffic Analysis: Extending and Resisting Statistical Disclosure Practical Traffic Analysis: Extending and Resisting Statistical Disclosure Nick Mathewson and Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net Abstract. We extend earlier research on

More information

Lecture Notes in Computational Science and Engineering 53

Lecture Notes in Computational Science and Engineering 53 Lecture Notes in Computational Science and Engineering 53 Editors Timothy J. Barth Michael Griebel David E. Keyes Risto M. Nieminen Dirk Roose Tamar Schlick Hans-Joachim Bungartz Michael Schäfer (Eds.)

More information

MATLAB Programming for Numerical Analysis. César Pérez López

MATLAB Programming for Numerical Analysis. César Pérez López MATLAB Programming for Numerical Analysis César Pérez López MATLAB Programming for Numerical Analysis Copyright 2014 by César Pérez López This work is subject to copyright. All rights are reserved by the

More information

Stefan Waldmann. Topology. An Introduction

Stefan Waldmann. Topology. An Introduction Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3

More information

Heartland Environmental and Resource Economics Workshop, September 17-18, 2000

Heartland Environmental and Resource Economics Workshop, September 17-18, 2000 Heartland Environmental and Resource Economics Workshop, September 17-18, 2000 PARTICIPANT LIST AMY ANDO Department of Ag & Consumer Economics Ph: 217-333-5130 Email: amyando@uiuc.edu CHRIS AZEVEDO Postgraduate

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 246 I II I I Graph-Theoretic Concepts in Computer Science International Workshop WG '86 Bernried, Federal Republic of Germany, June

More information

Lecture Notes in Computer Science 3544

Lecture Notes in Computer Science 3544 Lecture Notes in Computer Science 3544 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

The Architectural Logic of Database Systems

The Architectural Logic of Database Systems The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,

More information

The Essence of Compiling with Continuations

The Essence of Compiling with Continuations RETROSPECTIVE: The Essence of Compiling with Continuations Cormac Flanagan Amr Sabry Bruce F. Duba Matthias Felleisen Systems Research Center Compaq cormac.flanagan@compaq.com Dept. of Computer Science

More information

Addressing Privacy: Matching User Requirements with Implementation Techniques

Addressing Privacy: Matching User Requirements with Implementation Techniques Addressing Privacy: Matching User Requirements with Implementation Techniques Evangelia Kavakli 1, Christos Kalloniatis 1 and Stefanos Gritzalis 2 Abstract--The paper considers the basic privacy requirements

More information

On the Origins of a Thesis

On the Origins of a Thesis STM 2008 On the Origins of a Thesis Steven J. Murdoch 1 University of Cambridge Computer Laboratory Cambridge, United Kingdom Abstract A PhD thesis typically reads as an idealised narrative: how would

More information

IP address. When you connect to another computer you send it your IP address.

IP address. When you connect to another computer you send it your IP address. Anonymity IP address When you connect to another computer you send it your IP address. It is very hard to communicate without revealing an address on which you can receive traffic. Recent court cases have

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Toward Improving Path Selection in Tor

Toward Improving Path Selection in Tor Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department

More information