IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Anonymous channel and authentication in wireless communications
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Hi-index | 0.00 |
In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. In this paper, it is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented.