Abstract
This talk summarizes the results of a series of workshops on privacy protecting technologies convened in the fall of 2006 by the Office of the Director of National Intelligence through its Civil Liberties Protection Office and the (then) Disruptive Technology Office (now part of the Intelligence Advanced Research Projects Activity, IARPA).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50–67. Springer, Heidelberg (2007)
Toffler Report. Office of Disruptive Technologies, United States Government (unpublished report)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Landwehr, C. (2009). Results of Workshops on Privacy Protection Technologies. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-10233-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10232-5
Online ISBN: 978-3-642-10233-2
eBook Packages: Computer ScienceComputer Science (R0)