用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Introduction to Privacy Enhancing Technologies; A Classification-Bas Carlisle Adams Textbook 2021 The Editor(s) (if applicable) and The Aut

[复制链接]
查看: 42194|回复: 50
发表于 2025-3-21 17:03:35 | 显示全部楼层 |阅读模式
书目名称Introduction to Privacy Enhancing Technologies
副标题A Classification-Bas
编辑Carlisle Adams
视频video
概述This book covers (including exercises and examples) many of the fundamental, widely known PETs (Privacy Enhancing Technologies), as well as some of the important emerging technologies in this field.Ta
图书封面Titlebook: Introduction to Privacy Enhancing Technologies; A Classification-Bas Carlisle Adams Textbook 2021 The Editor(s) (if applicable) and The Aut
描述This textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations..Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data?.This book addresses the above questions by focusing on three fundamental elements:.It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed;.It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field;.It explainshow to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book ex
出版日期Textbook 2021
关键词Privacy; security; privacy enhancing technologies (PETs); personally identifiable information (PII); cry
版次1
doihttps://doi.org/10.1007/978-3-030-81043-6
isbn_softcover978-3-030-81042-9
isbn_ebook978-3-030-81043-6
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Introduction to Privacy Enhancing Technologies影响因子(影响力)




书目名称Introduction to Privacy Enhancing Technologies影响因子(影响力)学科排名




书目名称Introduction to Privacy Enhancing Technologies网络公开度




书目名称Introduction to Privacy Enhancing Technologies网络公开度学科排名




书目名称Introduction to Privacy Enhancing Technologies被引频次




书目名称Introduction to Privacy Enhancing Technologies被引频次学科排名




书目名称Introduction to Privacy Enhancing Technologies年度引用




书目名称Introduction to Privacy Enhancing Technologies年度引用学科排名




书目名称Introduction to Privacy Enhancing Technologies读者反馈




书目名称Introduction to Privacy Enhancing Technologies读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:43:49 | 显示全部楼层
https://doi.org/10.1007/978-3-030-81043-6Privacy; security; privacy enhancing technologies (PETs); personally identifiable information (PII); cry
发表于 2025-3-22 03:12:57 | 显示全部楼层
The Privacy Minefield,sumed throughout this book and describes a number of threats to privacy in our online world. Finally, it suggests that we are in a . and argues that unless we increase our awareness and employ suitable tools, there can be serious consequences for our personal lives.
发表于 2025-3-22 06:59:32 | 显示全部楼层
A Collection of Tools: The Privacy Tree,y be a helpful way to compare and contrast these PETs, leading to a greater understanding of which ones are most appropriate for particular privacy goals. A literature review is provided and one selected classification is described in some detail.
发表于 2025-3-22 11:22:53 | 显示全部楼层
Limiting Exposure by Hiding the Identity,ed: mix networks; anonymous remailers; and onion routing networks. For each of these examples, the original scheme is given, enhancements made over the years are presented, and strengths and limitations of the technology are discussed.
发表于 2025-3-22 13:56:59 | 显示全部楼层
Limiting Exposure by Hiding the Action,ory, the following PETs are described: transport layer security; network layer security (IPsec in transport mode); and private information retrieval. As with the previous chapter, for each of these examples, the original scheme is given, enhancements made over the years are presented, and strengths and limitations of the technology are discussed.
发表于 2025-3-22 20:55:12 | 显示全部楼层
Limiting Exposure by Hiding the Identity-Action Pair, in this leaf are network layer security (IPsec in tunnel mode) and off-the-record messaging. The chapter discusses the original scheme, some enhancements made over the years, and strengths and limitations of each technology.
发表于 2025-3-22 23:58:29 | 显示全部楼层
Limiting Disclosure by Hiding the Identity,ies that limit disclosure by hiding the identity of the user. The chapter describes the following example PETs in this category: .-anonymity and credential systems. The basic scheme, enhancements, strengths, and limitations are presented for each of these PETs.
发表于 2025-3-23 04:50:13 | 显示全部楼层
Limiting Disclosure by Hiding the Attribute,mple PETs in this category are described: ciphertext-policy attribute-based encryption; multi-party computation; and .-differential privacy. For each presented PET, the basic scheme, enhancements, strengths, and limitations are described.
发表于 2025-3-23 06:46:58 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-15 13:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表