Warehouse Stock Clearance Sale

Grab a bargain today!


Privacy Enhancing Technologies
By

Rating

Product Description
Product Details

Table of Contents

Analyzing PETs for Enterprise Operations.- Perfect Matching Disclosure Attacks.- An Indistinguishability-Based Characterization of Anonymous Channels.- On the Impact of Social Network Profiling on Anonymity.- Shining Light in Dark Places: Understanding the Tor Network.- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover.- Breaking and Provably Fixing Minx.- Metrics for Security and Performance in Low-Latency Anonymity Systems.- Studying Timing Analysis on the Internet with SubRosa.- Bridging and Fingerprinting: Epistemic Attacks on Route Selection.- Chattering Laptops.- How to Bypass Two Anonymity Revocation Schemes.- Reputation Systems for Anonymous Networks.- PAR: Payment for Anonymous Routing.

Ask a Question About this Product More...
 
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top