DocumentCode :
2295474
Title :
Anonymity in a mobile computing environment
Author :
Asokan, N.
Author_Institution :
Dept. of Comput. Sci., Waterloo Univ., Ont., Canada
fYear :
1994
fDate :
8-9 Dec 1994
Firstpage :
200
Lastpage :
204
Abstract :
In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. It is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented
Keywords :
cryptography; data privacy; mobile communication; telecommunication computing; anonymity; mobile computing environment; mobile entities; standard cryptographic techniques; Authentication; Computer networks; Computer science; Data security; Distributed computing; Information security; Mobile computing; Network servers; Protection; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Computing Systems and Applications, 1994. Proceedings., Workshop on
Conference_Location :
Santa Cruz, CA
Print_ISBN :
0-8186-6345-6
Type :
conf
DOI :
10.1109/MCSA.1994.513484
Filename :
513484
Link To Document :
بازگشت