117 research outputs found

    Dynamische Teilrouten zur anonymen Navigation

    Get PDF
    Um Privacy bei Location Based Services (LBS) zu gewährleisten, muss auf Anwendungsebene verhindert werden, dass der Service Provider bei Navigationsabfragen die Pfade des Nutzers nachverfolgen kann. Gleichzeitig muss die Funktionsfähigkeit des Service erhalten bleiben. Durch Stückelung der Route und anonyme Abfrage der Teilrouten lässt sich ein Privacy Enhanced Routing unter Einschränkung der Genauigkeit realisieren

    Integrating Privacy-Enhancing Technologies into the Internet Infrastructure

    Get PDF
    The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the viable adjustment and development of standards, business models and pricing strategies for those new technologies

    Security in Public Mobile Communication Networks

    Get PDF
    Introduction The increasing use of mobile communication networks results in ever more stringent security requirements. In an information society, availability, integrity and confidentiality are essential. Especially the provision of the latter is hard to demonstrate. If someone or some component is able to collect and store personal data, one cannot be sure that this data is not gathered and not (mis)used. But this "being sure" is essential with respect to privacy and data protection. Therefore, legal means alone are insufficient and have to be complemented by technical means we are going to describe in the sequel. This first part is introductory and reflects the structure of future mobile communication networks. When users communicate in such networks there is much data generated which needs to be handled in a secure way. We present data protection and security requirements which we believe are the strongest ever presented. 1.1 Structure of Future Mobile Telecommun
    • …
    corecore