Explores unstructured and structured search and routing protocols, emphasizing the importance of network structure assumptions and introducing the 'Bubble Storm' algorithm.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.
Explores the transition to terahertz frequencies and energy efficiency in future wireless networks, emphasizing the move towards sustainable and high-speed communication.
Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Explores networked individualism, the shift to individual-centric social networks, and the impact of connectivity, weaker group boundaries, and increased personal autonomy on society.