Please use this identifier to cite or link to this item: http://hdl.handle.net/10773/8059
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGomes, D.pt
dc.contributor.authorAguiar, R. L.pt
dc.date.accessioned2012-04-12T16:23:32Z-
dc.date.issued2006-
dc.identifier.issn1930-529X-
dc.identifier.urihttp://hdl.handle.net/10773/8059-
dc.description.abstractThe wireless digital lifestyle comes to the expense of less privacy and security. This environment is prone to be monitored by rogue users, eager to learn from our lifestyle habits and use them for their own profit. The IP protocol provides very few mechanisms, in order to safeguard user privacy and impair efficient data-mining of user habits. This paper will address an identity architecture that makes use of both data (L2) and network (L3) layer identifiers in order to provide a pseudonimization function, based on virtual hoarding concepts. Our proposal is especially interesting when able to exploit the broadcast and promiscuous nature of wireless communications that usually is regarded as a security concern. A prototype implementation has been developed and tested.pt
dc.language.isoengpt
dc.publisherIEEEpt
dc.relationFCT/ EU - Project Daidalospt
dc.rightsrestrictedAccesspor
dc.subjectIP networkspt
dc.subjectPrivacypt
dc.subjectWireless communicationspt
dc.titlePrivacy through Virtual Hordingpt
dc.typeconferenceObjectpt
dc.peerreviewedyespt
ua.publicationstatuspublishedpt
ua.event.date27 Novembro a 1 Dezembro, 2006pt
ua.event.typeconferencept
degois.publication.firstPage1pt
degois.publication.lastPage6pt
degois.publication.titleGLOBECOM 2006: IEEE Global Telecommunications Conference-
dc.date.embargo10000-01-01-
dc.identifier.doi10.1109/GLOCOM.2006.322pt
Appears in Collections:IT - Comunicações

Files in This Item:
File Description SizeFormat 
04150952.pdf394.78 kBAdobe PDFrestrictedAccess


FacebookTwitterLinkedIn
Formato BibTex MendeleyEndnote Degois 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.