Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.
Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores privacy-preserving data publishing mechanisms, including k-anonymity and differential privacy, and their practical applications and challenges.