eCommons

 

Preserving Privacy in a Network of Mobile Computers

dc.contributor.authorCooper, David A.en_US
dc.contributor.authorBirman, Kenneth P.en_US
dc.date.accessioned2007-04-23T18:00:51Z
dc.date.available2007-04-23T18:00:51Z
dc.date.issued1995-03en_US
dc.description.abstractEven as wireless networks create the potential for access to information from mobile platforms, they pose a problem for privacy. In order to retrieve messages, users must periodically poll the network. The information that the user must give to the network could potentially be used to track that user. However, the movements of the user can also be used to hide the user's location if the protocols for sending and retrieving messages are carefully designed. We have developed a replicated memory service which allows users to read from memory without revealing which memory locations they are reading. Unlike previous protocols, our protocol is efficient in its use of computation and bandwidth. In this paper, we will show how this protocol can be used in conjunction with existing privacy preserving protocols to allow a user of a mobile computer to maintain privacy despite active attacks.en_US
dc.format.extent250241 bytes
dc.format.extent287970 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR95-1490en_US
dc.identifier.urihttps://hdl.handle.net/1813/7148
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titlePreserving Privacy in a Network of Mobile Computersen_US
dc.typetechnical reporten_US

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
95-1490.pdf
Size:
244.38 KB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
95-1490.ps
Size:
281.22 KB
Format:
Postscript Files