Privacy Enhancing Technologies 2002

Adam Shostack adam at zeroknowledge.com
Thu Feb 21 15:38:35 EST 2002



Privacy Enhancing Technologies 2002
April 14-15, 2002
San Francisco, CA

Call for Participation


Registration for Privacy Enhancing Technologies 2002 is now open.
Details and online registration can be found at http://www.pet2002.org/
along with the program and hotel information.

Privacy and anonymity are increasingly important in the online
world. Corporations and governments are starting to realize their power
to track users and their behavior, and restrict the ability to publish
or retrieve documents. Approaches to protecting individuals, groups,
and even companies and governments from such profiling and censorship
have included decentralization, encryption, and distributed trust.

Building on the success of the first anonymity and unobservability
workshop (LNCS 2009, held in Berkeley in July 2000), PET2002 addresses
the design and realization of such anonymity and anti-censorship services
for the Internet and other communication networks. The program consists
of peer reviewed papers, an invited talk, and a panel discussion on
policy. The proceedings will be published in the Springer-Verlag Lecture
Notes in Computer Science series.





Preliminary PET2002 program:

  David Chaum: Invited Talk

  "Privacy-enhancing technologies for the Internet, II: Five years later"
  Ian Goldberg

  "Detecting Web Bugs With Bugnosis: Privacy Advocacy Through Education"
  Adil Alsaid, David Martin

  "Private authentication"
  Martin Abadi

  "Towards an Information Theoretic Metric for Anonymity"
  Andrei Serjantov, George Danezis

  "Towards Measuring Anonymity"
  Claudia Diaz, Stefaan Seys, Joris Claessens, Bart Preneel

  "The Platform for Enterprise Privacy Practices -- Privacy-enabled
  Management of Customer Data"
  G{\"u}nter Karjoth, Matthias Schunter, Michael Waidner
 
  "Privacy Enhancing Profile Disclosure"
  Peter Dornbach, Zoltan Nemeth

  "Privacy Enhancing Service Architectures"
  Tero Alamaki, Margareta Bjorksten, Peter Dornbach, Casper Gripenberg,
  Norbert Gyorbiro, Gabor Marton, Zoltan Nemeth, Timo Skytta, Mikko
  Tarkiainen

  Policy Panel, moderated by John Borking

  "Dummy Traffic Against Long Term Intersection Attacks"
  Oliver Berthold, Heinrich Langos

  "Protecting Privacy during On-line Trust Negotiation"
  Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis

  "Prototyping an Armored Data Vault: Rights Management on Big Brother's
  Computer"
  Alex Iliev, Sean Smith

  "Preventing Interval-based Inference by Random Data Perturbation"
  Yingjiu Li, Lingyu Wang, and Sushil Jajodia

  "Fingerprinting Websites Using Traffic Analysis"
  Andrew Hintz

  "A Passive Attack on the Privacy of Web Users Using Standard Log
  Information"
  Thomas Demuth

  "Covert Messaging Through TCP Timestamps"
  John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts

  "Almost Optimal Private Information Retrieval"
  Dmitri Asonov, Johann-Christoph Freytag

  "Unobservable Surfing on the World Wide Web: Is Private Information
  Retrieval an alternative to the MIX based Approach?"
  Dogan Kesdogan, Mark Borning, Michael Schmeink


(please distribute widely)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list