Privacy, Control and Internet Mobility (Transcript of Discussion)

  • Tuomas Aura
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


This is work not yet done by myself and Alf Zugenmaier at Microsoft Research here in Cambridge. With Alf being a privacy person we’re starting to think about the kind of threats there are to a wireless mobile user’s privacy. We thought these threats actually matter to the user, and so what can we do about them? Especially, what can we do at the time of attack, or when designing network protocols to improve the users privacy? This is a position paper about the kinds of things we think probably matter and should be done.


Mobile Phone Internet Access Security Protocol Home Agent Home Base 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tuomas Aura
    • 1
  1. 1.Microsoft ResearchCambridgeUK

Personalised recommendations