Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Curbing Junk E-Mail via Secure Classification
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Hi-index | 0.00 |
Awareness of legal constraints regarding the use and provision of electronic systems, leads us to question the feasibility and applicability of technical solutions that take into account security and privacy regulations. We discuss the issue with reference to directives of the European Community and Italian legislation. In particular we study the case of e-mail, proposing a protocol that retains as many characteristics of the e-mail as possible, yet allowing for complete anonymity and proofs of correct deploy. We discuss the implications of taking anonymity to the extremes and evaluate the limits of the protocol.