Individual management of personal reachability in mobile communication
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Privacy-enhanced Key Recovery in mobile communication environments
The Journal of Supercomputing
Hi-index | 0.00 |
We propose a new scheme, protecting information about the location of a user against attacks from inside the mobile communication, especially the network providers. There have already been some proposals about how to protect location information in mobile communication environments. Among them, Kesdogan et al.[2,3] proposed a new method, using so-called temporary pseudonyms and also described protection method against passive and an active attacks. However, the protection method against an active attack is not clear. Moreover, there is an additional load in that it should append a reachability manager[1,6] to the proposed system. In this paper, we introduce a new scheme improving the method of Kesdogan et al. and analyze its security and effectiveness.