2007
DOI: 10.1007/s11416-007-0049-x
|View full text |Cite
|
Sign up to set email alerts
|

Transaction pseudonyms in mobile environments

Abstract: Network Operators start to offer formerly hidden services such as location service, messaging services and presence services. This fosters the development of a new class of innovative context aware applications that are operated by third party application providers. However, without the implementation of proper privacy protection mechanisms, location and presence information, that is processed by third party application providers, may also imply severe risks to users. If no privacy protection is foreseen, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…In the following we give a short introduction to the pseudonym approach: We assume that the Client and the Broker share a secret key ( pswd ) as well as an initial value (rand) generated by the Diffie Hellman cryptographic protocol 26. We also use a schema that is based on the keyed hash function HMAC 27. The keyed hash function HMAC that is denoted as h k can be initialized with a random value r .…”
Section: Integrating Gset With a Mobile Clientmentioning
confidence: 99%
“…In the following we give a short introduction to the pseudonym approach: We assume that the Client and the Broker share a secret key ( pswd ) as well as an initial value (rand) generated by the Diffie Hellman cryptographic protocol 26. We also use a schema that is based on the keyed hash function HMAC 27. The keyed hash function HMAC that is denoted as h k can be initialized with a random value r .…”
Section: Integrating Gset With a Mobile Clientmentioning
confidence: 99%
“…It is acknowledged that there are reported positive and negative consequences of using pseudonymisation for various data streams in computer security, forensic computing and other related areas [15][16][17][18][19][20][21][22][23]. However, to address these underlying privacy concerns it would appear that there is merit in exploring the deployment of pseudonymisation.…”
Section: Part Two: Ims Implications: Privacy Security and Forensic Cmentioning
confidence: 99%