Abstract
This is work not yet done by myself and Alf Zugenmaier at Microsoft Research here in Cambridge. With Alf being a privacy person we’re starting to think about the kind of threats there are to a wireless mobile user’s privacy. We thought these threats actually matter to the user, and so what can we do about them? Especially, what can we do at the time of attack, or when designing network protocols to improve the users privacy? This is a position paper about the kinds of things we think probably matter and should be done.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aura, T. (2006). Privacy, Control and Internet Mobility (Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_15
Download citation
DOI: https://doi.org/10.1007/11861386_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40925-0
Online ISBN: 978-3-540-40926-7
eBook Packages: Computer ScienceComputer Science (R0)