You are here: Home > 



8th Privacy Enhancing Technologies Symposium (July 23 - July 25, 2008)

Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior. Approaches to protecting individuals, groups, but also companies and governments from profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure.

The 8th Privacy Enhancing Technologies Symposium addresses the design and realization of such privacy services for the Internet and other communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives.

The symposium seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present their perspectives on technological issues. In a departure from previous years, the symposium proceedings will be available at the event, rather than after it. They will continue to be published in the Springer Lecture Notes in Computer Science series.

Suggested topics include but are not restricted to:

  • Anonymous communications and publishing systems
  • Censorship resistance
  • Pseudonyms, identity management, linkability, and reputation
  • Data protection technologies
  • Location privacy
  • Privacy in Ubiquitous Computing Environments
  • Policy, law, and human rights relating to privacy
  • Privacy and anonymity in peer-to-peer architectures
  • Economics of privacy
  • Fielded systems and techniques for enhancing privacy in existing systems
  • Protocols that preserve anonymity/privacy
  • Privacy-enhanced access control or authentication/certification
  • Privacy threat models
  • Models for anonymity and unobservability
  • Attacks on anonymity systems
  • Traffic analysis
  • Profiling and data mining
  • Privacy vulnerabilities and their impact on phishing and identity theft
  • Deployment models for privacy infrastructures
  • Novel relations of payment mechanisms and anonymity
  • Usability issues and user interfaces for PETs
  • Reliability, robustness and abuse prevention in privacy systems
01.02.2008 14:12 Age: 11 Jahre