Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.
Introduces Attribute-Based Credentials and Mercurial Signatures, discussing privacy concerns with authentication and the importance of preserving user privacy.
Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.