Narrow your search

Library

AP (2)

EhB (2)

KDG (2)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

More...

Resource type

book (4)

digital (2)


Language

English (6)


Year
From To Submit

2006 (6)

Listing 1 - 6 of 6
Sort by

Digital
Privacy Enhancing Technologies (vol. # 3856) : 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers
Authors: ---
ISBN: 9783540347460 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Privacy Enhancing Technologies (vol. # 4258) : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
Authors: ---
ISBN: 9783540687931 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers
Authors: --- ---
ISBN: 9783540347453 3540347453 3540347461 Year: 2006 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Privacy, Right of. --- Invasion of privacy --- Right of privacy --- Law and legislation --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval

Privacy enhancing technologies : 6th international workshop, PET 2006, Cambridge, UK, June 28-30, 2006 : revised selected papers
Authors: --- ---
ISBN: 9783540687900 3540687904 3540687939 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Privacy Enhancing Technologies : 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers
Authors: --- ---
ISBN: 9783540347460 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

PET 2005 held in Cavtat (Croatia) from May 30 to June 1, 2005, was the th 5 Workshop on Privacy-Enhancing Technologies, which is now established as a yearly event. The workshop received 74 full paper submissions out of which 17 papers were ultimately selected to be presented. The selection process relied on over 200 reviews from the Program Committee, Program Chairs and additional reviewers, at least three per paper. A further 2-week long e-mail discussion led to consensus on the papers accepted-with the ultimate responsibility for the program resting on the Program Co-chairs. The number of accepted papers and ?nal program format was to ensure that PET retains its character as a workshop, with ample time for discussion, two panel discussions, and space for the fermentation of new ideas and collaborations. The Program Chairs would ?rst like to thank the PET 2005 Program C- mittee for the high-quality reviews and discussion that led to the program: - Martin Abadi, University of California at Santa Cruz, USA - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Caspar Bowden, Microsoft EMEA, UK - Jean Camp, Indiana University at Bloomington, USA - Richard Clayton, University of Cambridge, UK - LorrieCranor,SchoolofComputerScience,CarnegieMellonUniversity,USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Ian Goldberg, Zero Knowledge Systems, Canada - Philippe Golle, Palo Alto Research Center, USA - MaritHansen,IndependentCentreforPrivacyProtectionSchleswig-Holstein, Germany - Markus Jakobsson, Indiana University at Bloomington, USA - Dogan Kesdogan, Rheinisch-Westfaelische Technische Hochschule Aachen, Germany


Book
Privacy Enhancing Technologies : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
Authors: --- ---
ISBN: 9783540687931 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK), on June 28-30, 2006. The workshop received91full papersubmissionsoutofwhich24wereselectedfor presentation. As a rule, papers were reviewed by 3 independent members of the Program Committee, and often alsoby externalreviewers.A further two-weeklong online discussion took place amongst the PC to reach consensus on all submissions. The ultimate responsibility for the ?nal selection of papers rests on the program chairs. The ratio of acceptance puts PET in league with other premiere computer security venues, and guarantees a high quality scienti?c program. Yet PET also retains its character as a workshop, by providing a venue where promising new ideas canbe presentedanddiscussedbythe privacy community.Identifying high quality, as well as high potential, submissions was a di?cult balancing act. The program chairs would like to thank the Program Committee of PET 2006 for their invaluable work in helping select the best submissions: - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Mikhail Atallah, Purdue University, USA - Michael Backes, Saarland University, Germany - Alastair Beresford, University of Cambridge, UK - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Jan Camenisch, IBM Zurich Research Laboratory, Switzerland - Kim Cameron, Microsoft, USA - Fred Cate, Indiana University at Bloomington, USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Simone Fischer-Hubner ¨ , Karlstad University, Sweden - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA

Listing 1 - 6 of 6
Sort by