Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.