Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.
Covers the principles and strategies of privacy engineering, emphasizing the importance of embedding privacy into IT systems and the challenges faced in achieving privacy by design.
Explores privacy-preserving data publishing mechanisms, including k-anonymity and differential privacy, and their practical applications and challenges.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.