Lecture Notes in Computer Science 4258
|
|
- Jeffry Adam Carter
- 5 years ago
- Views:
Transcription
1 Lecture Notes in Computer Science 4258 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
2 George Danezis Philippe Golle (Eds.) Privacy Enhancing Technologies 6th International Workshop, PET 2006 Cambridge, UK, June 28-30, 2006 Revised Selected Papers 13
3 Volume Editors George Danezis Katholieke Universiteit Leuven Kasteelpark Arenberg 10 B-3001 Leuven-Heverlee, Belgium Philippe Golle Palo Alto Research Center 3333 Coyote Hill Rd Palo Alto, CA 94304, USA Library of Congress Control Number: CR Subject Classification (1998): E.3, C.2, D.4.6, K.6.5, K.4, H.3, H.4 LNCS Sublibrary: SL 4 Security and Cryptology ISSN ISBN Springer Berlin Heidelberg New York ISBN Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: /
4 Foreword The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK), on June 28 30, The workshop received 91 full paper submissions out of which 24 were selected for presentation. As a rule, papers were reviewed by 3 independent members of the Program Committee, and often also by external reviewers. A further two-week long online discussion took place amongst the PC to reach consensus on all submissions. The ultimate responsibility for the final selection of papers rests on the program chairs. The ratio of acceptance puts PET in league with other premiere computer security venues, and guarantees a high quality scientific program. Yet PET also retains its character as a workshop, by providing a venue where promising new ideas can be presented and discussed by the privacy community. Identifying high quality, as well as high potential, submissions was a difficult balancing act. The program chairs would like to thank the Program Committee of PET 2006 for their invaluable work in helping select the best submissions: - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Mikhail Atallah, Purdue University, USA - Michael Backes, Saarland University, Germany - Alastair Beresford, University of Cambridge, UK - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Jan Camenisch, IBM Zurich Research Laboratory, Switzerland - Kim Cameron, Microsoft, USA - Fred Cate, Indiana University at Bloomington, USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Simone Fischer-Hübner, Karlstad University, Sweden - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA - Dennis Kügler, Federal Office for Information Security, Germany - Brian Levine, University of Massachusetts at Amherst, USA - David Molnar, University of California at Berkeley, USA - Andreas Pfitzmann, Dresden University of Technology, Germany - Mike Reiter, Carnegie Mellon University, USA - Andrei Serjantov, The Free Haven Project, UK - Paul Syverson, Naval Research Lab, USA - Matthew Wright, University of Texas at Arlington, USA Additional reviewers included Christer Andersson, Marina Blanton, Katrin Borcea-Pfitzmann, Sebastian Clauß, Richard Clayton, Hatim Daginawala,
5 VI Preface Markus Duermuth, Nick Feamster, Keith Frikken, Rachel Greenstadt, Thomas Heydt-Benjamin, Ari Juels, Lea Kissner, Stefan Köpsell, Klaus K. Kursawe, Pil Joong Lee, Jiangtao Li, Katja Liesebach, Leonardo A. Martucci, Nick Mathewson, Steven J. Murdoch, Gregory Neuven, Amit Sahai, Antje Schneidewind, Dagmar Schufeld, Sid Stamm, Sandra Steinbrecher, Madhu Venkateshaiah, and Lasse Øverlier. Their help was very much appreciated. We are especially grateful to our General Chair, Richard Clayton, from the University of Cambridge Computer Laboratory, for taking care of all local arrangements. Thomas Herlea, from the K.U. Leuven, was kind enough to help us with the online submission and reviewing system. PET 2006 was collocated with two events. WEIS 2006, the Workshop on the Economics of Information Security, shared a session with PET on the economics of privacy and surveillance. We are very grateful to Ross Anderson, WEIS Chair, and Tyler Moore, WEIS General Chair, who took care of local arrangements, for their help in coordinating the two events. Secondly, WOTE 2006, the Workshop on Trustworthy Elections, coordinated by Peter Ryan, shared the last two days of the workshop. Participants of both workshops were free to circulate between all sessions, and social activities during the day were shared to maximize the synergy between the two communities. PET 2006 was made possible, and more affordable, thanks to the continuing generous sponsorship of Microsoft. We are particularly indebted to Caspar Bowden and JC Cannon, who actively contributed to the success of the workshop by providing this sponsorship and support. Roger Dingledine was kind enough to manage and distribute the stipends to those participants who needed them. The PET prize, sponsored by Microsoft and the Office of the Information and Privacy Commissioner of Ontario, was this year awarded through an independent prize committee headed by Alessandro Acquisti, to whom we are thankful. The 2006 prize was awarded to Daniel Solove for his paper entitled A Taxonomy of Privacy. The award ceremony took place at Microsoft Research Cambridge, along with live demonstrations of privacy technology. October 2006 George Danezis and Philippe Golle Program Chairs PET 2006
6 Table of Contents 6 th Workshop on Privacy Enhancing Technologies Privacy for Public Transportation... 1 Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N.M. Watson Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook Alessandro Acquisti and Ralph Gross Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks Mansour Alsaleh and Carlisle Adams Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, and Elisa Bertino Privacy Injector Automated Privacy Enforcement Through Aspects Chris Vanden Berghe and Matthias Schunter A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises Marco Casassa Mont and Robert Thyne One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique Simson L. Garfinkel and David J. Malan Protecting Privacy with the MPEG-21 IPMP Framework Nicholas Paul Sheppard and Reihaneh Safavi-Naini Personal Rights Management Taming Camera-Phones for Individual Privacy Enforcement Mina Deng, Lothar Fritsch, and Klaus Kursawe Improving Sender Anonymity in a Structured Overlay with Imprecise Routing Giuseppe Ciaccio
7 VIII Table of Contents Selectively Traceable Anonymity Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, and Kevin O Neill Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier and Paul Syverson Blending Different Latency Traffic with Alpha-mixing Roger Dingledine, Andrei Serjantov, and Paul Syverson Private Resource Pairing Joseph A. Calandrino and Alfred C. Weaver Honest-Verifier Private Disjointness Testing Without Random Oracles Susan Hohenberger and Stephen A. Weis A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication) Gene Tsudik and Shouhuai Xu On the Security of the Tor Authentication Protocol Ian Goldberg Optimal Key-Trees for Tree-Based Private Authentication Levente Buttyán, Tamás Holczer, and István Vajda Simple and Flexible Revocation Checking with Privacy John Solis and Gene Tsudik Breaking the Collusion Detection Mechanism of MorphMix Parisa Tabriz and Nikita Borisov Linking Anonymous Transactions: The Consistent View Attack Andreas Pashalidis and Bernd Meyer Preserving User Location Privacy in Mobile Data Management Infrastructures Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment Bradley Malin and Edoardo Airoldi Author Index
Lecture Notes in Computer Science 7323
Lecture Notes in Computer Science 7323 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 5454
Lecture Notes in Computer Science 5454 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 5742
Lecture Notes in Computer Science 5742 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 3130
Lecture Notes in Computer Science 3130 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 3933
Lecture Notes in Computer Science 3933 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationAdvances in Artificial Reality and Tele-Existence
Zhigeng Pan Adrian Cheok Michael Haller Rynson W.H. Lau Hideo Saito Ronghua Liang (Eds.) Advances in Artificial Reality and Tele-Existence 16th International Conference on Artificial Reality and Telexistence,
More informationLecture Notes in Computer Science 3293
Lecture Notes in Computer Science 3293 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 6227
Lecture Notes in Computer Science 6227 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 8945
Lecture Notes in Computer Science 8945 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 6585
Lecture Notes in Computer Science 6585 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationLecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen
Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Gul A. Agha Fiorella De Cindio
More informationLecture Notes in Computer Science 5884
Lecture Notes in Computer Science 5884 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationJulien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC
Web Archiving Julien Masanès Web Archiving With 28 Figures and 6 Tables ABC Author Julien Masanès European Web Archive 25 rue des envierges 75020 Paris, France julien.masanes@bnf.fr ACM Computing Classification
More informationHigh Availability and Disaster Recovery
High Availability and Disaster Recovery Klaus Schmidt High Availability and Disaster Recovery Concepts, Design, Implementation With 83 Figures and 26 Tables 123 Klaus Schmidt Stockheimer Str. 20 60385
More informationLecture Notes in Computer Science 3427
Lecture Notes in Computer Science 3427 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationOverview. Passive Load. Measurement. Classification. Setup. Future Work
Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia Overview Passive Load Cloud providers often
More informationAutomated and Algorithmic Debugging
Peter A. Fritzson (Ed.) Automated and Algorithmic Debugging First International Workshop, AADEBUG '93 LinkiSping, Sweden, May 3-5, 1993 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris
More informationEnabling Technologies for Wireless E-Business
Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory
More informationLecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 371 I D. Hammer (Ed.) Compiler Compilers and High Speed Compilation 2rid CCHSC Workshop Berlin, GDR, October 10-14, 1988 Proceedings
More informationLecture Notes in Computer Science 3279
Lecture Notes in Computer Science 3279 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationGeometric Modeling and Algebraic Geometry
Geometric Modeling and Algebraic Geometry Bert Jüttler Ragni Piene Editors Geometric Modeling and Algebraic Geometry 123 Bert Jüttler Institute of Applied Geometry Johannes Kepler University Altenberger
More informationInterfacing with C++
Interfacing with C++ Jayantha Katupitiya Kim Bentley Interfacing with C++ Programming Real-World Applications ABC Dr. Jayantha Katupitiya Senior Lecturer School of Mechanical and Manufacturing Engineering
More informationLecture Notes in Computer Science 3604
Lecture Notes in Computer Science 3604 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationReal-Time Graphics Rendering Engine
Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang
More informationSocial Networking for Anonymous Communication Systems: A Survey
Social Networking for Anonymous Communication Systems: A Survey Rodolphe Marques Instituto de Telecomunicações Aveiro, Portugal rmarques@av.it.pt André Zúquete Universidade de Aveiro/IEETA Aveiro, Portugal
More informationLecture Notes in Computer Science 1506 Edited by G. Goos, J. Hartmanis and J. van Leeuwen
Lecture Notes in Computer Science 1506 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Reinhard Koch Luc Van Gool
More informationGroup Authentication Using The Naccache-Stern Public-Key Cryptosystem
Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such
More informationObject-Based Concurrent Computing
M. Tokoro O. Nierstrasz E Wegner (Eds.) Object-Based Concurrent Computing ECOOP '91 Workshop Geneva, Switzerland, July 15-16, 1991 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris Tokyo
More informationLecture Notes in Business Information Processing 67
Lecture Notes in Business Information Processing 67 Series Editors Wil van der Aalst Eindhoven Technical University, The Netherlands John Mylopoulos University of Trento, Italy Michael Rosemann Queensland
More informationTowards measuring anonymity
Towards measuring anonymity Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 0, B-300 Leuven-Heverlee, Belgium claudia.diaz@esat.kuleuven.ac.be http://www.esat.kuleuven.ac.be/cosic/
More informationLecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen
Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1605 Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Jonathan Billington
More informationNonesuch: a Mix Network with Sender Unobservability
Nonesuch: a Mix Network with Sender Unobservability Thomas S. Heydt-Benjamin University of Massachusetts at Amherst tshb@cs.umass.edu Andrei Serjantov The Freehaven Project schnur@gmail.com Benessa Defend
More informationBridging and Fingerprinting: Epistemic Attacks on Route Selection
Bridging and Fingerprinting: Epistemic Attacks on Route Selection George Danezis 1 and Paul Syverson 2 1 Microsoft Research, Cambridge, UK. 2 Naval Research Laboratory, USA. Abstract. Users building routes
More informationDon t clog the queue!
Don t clog the queue! Circuit clogging and mitigation in P2P anonymity schemes Jon McLachlan and Nicholas Hopper Computer Science & Engineering, University of Minnesota, Minneapolis MN 55455 USA {hopper,jmcla}@cs.umn.edu
More informationA Recovery Approach for SQLite History Recorders from YAFFS2
A Recovery Approach for SQLite History Recorders from YAFFS2 Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng To cite this : Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, et al..
More informationAnonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012
Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the
More informationLecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen
Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Harrie de Swart Ewa Orłowska Gunther Schmidt Marc
More informationLecture Notes in Computer Science 7037
Lecture Notes in Computer Science 7037 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationAnonymous Credentials through Acid Mixing
Anonymous Credentials through Acid Mixing Alessandro Acquisti Carnegie Mellon University June 2003 Abstract Reliability and trust are open issues in the MIX-net literature. We present a variation on the
More informationLecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris
Lecture Notes in Mathematics 1842 Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Trygve Johnsen Andreas Leopold Knutsen
More informationAdvanced Data Mining Techniques
Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu
More informationMessage Splitting Against the Partial Adversary
Message Splitting Against the Partial Adversary Andrei Serjantov and Steven J. Murdoch The Free Haven Project, UK schnur@gmail.com University of Cambridge Computer Laboratory, 5 JJ Thomson Ave, Cambridge,
More informationCE Advanced Network Security Anonymity II
CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert
More informationCatching Inside Attackers
Catching Inside Attackers Balancing Forensic Detectability and Privacy of Employees Jens Lindemann, Ephraim Zimmer, Dominik Herrmann, Hannes Federrath October 29, 2015 2014 US state of cybercrime survey
More informationContributions to Economics
Contributions to Economics Kesra Nermend Vector Calculus in Regional Development Analysis Comparative Regional Analysis Using the Example of Poland Physica Verlag A Springer Company Dr. inž. Kesra Nermend
More informationNetwork Forensics and Privacy Enhancing Technologies living together in harmony
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2006 Network Forensics and Privacy Enhancing Technologies living together
More informationDetecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann, Stefan Katzenbeisser To cite this version: Sebastian Biedermann, Stefan Katzenbeisser. Detecting Computer Worms in the Cloud. David Hutchison;
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series editors Stan Zdonik, Brown University, Providence, Rhode Island, USA Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA Xindong Wu, University
More informationSoftware Development for SAP R/3
Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example
More informationQuantifying Information Leakage in Tree-Based Hash Protocols
Quantifying Information Leakage in Tree-Based Hash Protocols Technical Report CS-- Karsten Nohl and David Evans University of Virginia Computer Science Department {nohl,evans}@cs.virginia.edu Abstract.
More informationThirteenth International Workshop on Quality of Service (IWQoS 2005) Passau, Germany, June
09:00 11:00 The User Experience of QoS Session Chair: Ralf Steinmetz, Technical University of Darmstadt, Germany A Self-Tuning Fuzzy Control Approach for End-to-End QoS Guarantees in Web Servers Jianbin
More informationLecture Notes in Artificial Intelligence 3932
Lecture Notes in Artificial Intelligence 3932 Edited by J. G. Carbonell and J. Siekmann Subseries of Lecture Notes in Computer Science Bamshad Mobasher Olfa Nasraoui Bing Liu Brij Masand Advances in Web
More informationE-Ticketing scheme for mobile devices with exculpability
E-Ticketing scheme for mobile devices with exculpability Arnau Vives-Guasch 1, Magdalena Payeras-Capella 2, Macià Mut-Puigserver 2 and Jordi Castellà-Roca 1 1 Dept. de Ingeniería Informática y Matemáticas
More informationGengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial
Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial With 163 Figures Author Prof. Dr. Gengsheng Lawrence
More informationA Simplified Privacy Preserving Message Delivery Protocol in VDTNs
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs Youngho Park, Chul Sur, Kyung-Hyune Rhee To cite this version: Youngho Park, Chul Sur, Kyung-Hyune Rhee. A Simplified Privacy Preserving
More informationBlending different latency traffic with alpha-mixing
Blending different latency traffic with alpha-mixing Roger Dingledine 1, Andrei Serjantov 2, and Paul Syverson 3 1 The Free Haven Project (arma@freehaven.net) 2 The Free Haven Project (aas23@freehaven.net)
More informationComputer Architecture
Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta
More informationGrid Computing Security
Grid Computing Security Anirban Chakrabarti Grid Computing Security With 87 Figures and 12 Tables 123 Anirban Chakrabarti Infosys Technologies Limited Electronic City Hosur Road 560100 Bangalore India
More informationOverview Scrollbar: A Scrollbar Showing an Entire Document as an Overview
Overview Scrollbar: A Scrollbar Showing an Entire Document as an Overview Ko Mizoguchi, Daisuke Sakamoto, Takeo Igarashi To cite this version: Ko Mizoguchi, Daisuke Sakamoto, Takeo Igarashi. Overview Scrollbar:
More informationJinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation
Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis
More informationBusiness Process Models
LNCS 7849 Christian Gerth Business Process Models Change Management 123 Lecture Notes in Computer Science 7849 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis,
More informationDigital Preservation Metadata for Practitioners
Digital Preservation Metadata for Practitioners Angela Dappert Rebecca Squire Guenther Sébastien Peyrard Editors Digital Preservation Metadata for Practitioners Implementing PREMIS 123 Editors Angela Dappert
More informationA Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks
A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks Mohammed Bahria, Alexis Olivereau, Aymen Boudguiga To cite this version: Mohammed Bahria, Alexis Olivereau,
More informationBig Data - Security with Privacy
Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,
More informationCAPTCHA Suitable for Smartphones
CAPTCHA Suitable for Smartphones Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura To cite this version: Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura. CAPTCHA Suitable for Smartphones. David Hutchison;
More informationPhilipp von Weitershausen. Web Component Development with Zope 3
Philipp von Weitershausen Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 With 39 Figures and 10 Tables 123 Philipp von Weitershausen Goebenstraße
More informationc-xsc R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch A C++ Class Library for Extended Scientific Computing Springer-Verlag Berlin Heidelberg GmbH
R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch c-xsc A C++ Class Library for Extended Scientific Computing Translated by G. F. Corliss C. Lawo R. Klatte A. Wiethoff C. Wolff Springer-Verlag Berlin Heidelberg
More informationOnion services. Philipp Winter Nov 30, 2015
Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based
More informationHow to Bypass Two Anonymity Revocation Schemes
How to Bypass Two Anonymity Revocation Schemes George Danezis 1 and Len Sassaman 2 1 Microsoft Research, Cambridge, UK gdane@microsoft.com 2 K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee,
More informationCOST TO DEFEAT THE N-1 ATTACK. Neil Chettiar
COST TO DEFEAT THE -1 ATTAC eil Chettiar The -1 Attack MIX Different Variations: Threshold Mixes Timed Mixes Pool Mixes Attacks are Exact and Certain. Basic idea: Attacker should be able to account for
More informationThe Information Retrieval Series. Series Editor W. Bruce Croft
The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationTowards Analyzing and Improving Service Accessibility under Resource Enumeration Attack
Available online at www.sciencedirect.com Procedia Computer Science 17 (2013 ) 836 843 Information Technology and Quantitative Management, ITQM 2013 Towards Analyzing and Improving Service Accessibility
More informationGuide to OSI and TCP/IP Models
SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi
More informationLecture Notes in Computer Science
L.. Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 60 M. J. Flynn, J. N. Gray, A. K. Jones, K. Lagally H. Opderbeck, G. J. Popek, B. Randell J. H. Saltzer, H. R. Wiehle Operating
More informationThe New Cell-Counting-Based Against Anonymous Proxy
The New Cell-Counting-Based Against Anonymous Proxy Yadarthugalla Raju M.Tech Student, Department of CSE, Dr.K.V.S.R.I.T, Kurnool. K. Pavan Kumar Assistant Professor, Department of IT, Dr.K.V.S.R.I.T,
More informationBreaking the Collusion Detection Mechanism of MorphMix
Breaking the Collusion Detection Mechanism of MorphMix Parisa Tabriz and Nikita Borisov University of Illinois at Urbana-Champaign {tabriz, nikita}@uiuc.edu Abstract. MorphMix is a peer-to-peer circuit-based
More informationTor Experimentation Tools
Tor Experimentation Tools Fatemeh Shirazi TU Darmstadt / KU Leuven Darmstadt, Germany fshirazi@cdc.informatik.tu-darmstadt.de Matthias Göhring TU Darmstadt Darmstadt, Germany de.m.goehring@ieee.org Claudia
More informationWireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada
Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi
More informationA Review of Security Attacks on the GSM Standard
A Review of Security Attacks on the GSM Standard Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo To cite this version: Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo.
More informationParallel Programming
Parallel Programming Thomas Rauber Gudula Rünger Parallel Programming For Multicore and Cluster Systems 123 Thomas Rauber Universität Bayreuth Computer Science Department 95440 Bayreuth Germany rauber@uni-bayreuth.de
More informationDataflow Testing of Java Programs with DFC
Dataflow Testing of Java Programs with DFC Ilona Bluemke, Artur Rembiszewski To cite this version: Ilona Bluemke, Artur Rembiszewski. Dataflow Testing of Java Programs with DFC. David Hutchison; Takeo
More information10 Years of FloCon. Prepared for FloCon George Warnagiris - CERT/CC #GeoWarnagiris Carnegie Mellon University
10 Years of FloCon Prepared for FloCon 2014 George Warnagiris - CERT/CC gwarnagi@cert.org #GeoWarnagiris 2014 Carnegie Mellon University Disclaimer NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
More informationLecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 469 I I. Guessarian (Ed.) Semantics of Systems of Concurrent Processes LITP Spring School on Theoretical Computer Science La Roche Posay,
More informationPractical Traffic Analysis: Extending and Resisting Statistical Disclosure
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure Nick Mathewson and Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net Abstract. We extend earlier research on
More informationLecture Notes in Computational Science and Engineering 53
Lecture Notes in Computational Science and Engineering 53 Editors Timothy J. Barth Michael Griebel David E. Keyes Risto M. Nieminen Dirk Roose Tamar Schlick Hans-Joachim Bungartz Michael Schäfer (Eds.)
More informationMATLAB Programming for Numerical Analysis. César Pérez López
MATLAB Programming for Numerical Analysis César Pérez López MATLAB Programming for Numerical Analysis Copyright 2014 by César Pérez López This work is subject to copyright. All rights are reserved by the
More informationStefan Waldmann. Topology. An Introduction
Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3
More informationHeartland Environmental and Resource Economics Workshop, September 17-18, 2000
Heartland Environmental and Resource Economics Workshop, September 17-18, 2000 PARTICIPANT LIST AMY ANDO Department of Ag & Consumer Economics Ph: 217-333-5130 Email: amyando@uiuc.edu CHRIS AZEVEDO Postgraduate
More informationLecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 246 I II I I Graph-Theoretic Concepts in Computer Science International Workshop WG '86 Bernried, Federal Republic of Germany, June
More informationLecture Notes in Computer Science 3544
Lecture Notes in Computer Science 3544 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationThe Architectural Logic of Database Systems
The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,
More informationThe Essence of Compiling with Continuations
RETROSPECTIVE: The Essence of Compiling with Continuations Cormac Flanagan Amr Sabry Bruce F. Duba Matthias Felleisen Systems Research Center Compaq cormac.flanagan@compaq.com Dept. of Computer Science
More informationAddressing Privacy: Matching User Requirements with Implementation Techniques
Addressing Privacy: Matching User Requirements with Implementation Techniques Evangelia Kavakli 1, Christos Kalloniatis 1 and Stefanos Gritzalis 2 Abstract--The paper considers the basic privacy requirements
More informationOn the Origins of a Thesis
STM 2008 On the Origins of a Thesis Steven J. Murdoch 1 University of Cambridge Computer Laboratory Cambridge, United Kingdom Abstract A PhD thesis typically reads as an idealised narrative: how would
More informationIP address. When you connect to another computer you send it your IP address.
Anonymity IP address When you connect to another computer you send it your IP address. It is very hard to communicate without revealing an address on which you can receive traffic. Recent court cases have
More informationProtocols for Anonymous Communication
18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your
More informationToward Improving Path Selection in Tor
Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department
More information