START Conference Manager    

Workshop on Privacy in the Electronic Society

WPES 2006

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


Use the fields below to make your submission. Follow the instructions, and then use the 'Submit' button at the bottom of the form.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15

More Authors      Fewer Authors


Contact Information:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Building 
Mail Code 
Street Address 
City/Town*
State/Province 
Country*
Zip/Postal Code*


Abstract:

Type (or cut-and-paste) a short ASCII abstract for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.

 


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

anonymity, pseudonymity, and unlinkability
privacy and confidentiality management
business model with privacy requirements
privacy in the electronic records
data protection from correlation and leakage attacks
privacy in health care and public administration
electronic communication privacy
public records and personal privacy
information dissemination control
privacy and virtual identity
privacy-aware access control
personally identifiable information
privacy in the digital business
privacy policy enforcement
privacy enhancing technologies
privacy and data mining
privacy policies
relationships between privacy and security
privacy and anonymity in Web transactions
user profiling
privacy threats
wireless privacy
privacy and human rights
economics of privacy
other
 
 



START Conference Manager (V2.61.0 - Rev. 6300)