Stefan Penz

Learn More
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present(More)
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective(More)
Service management in mobile ad-hoc networks has been a hot research topic in the past few years. With this demonstrator, we present the first service-oriented mid-dleware that unifies semantic service description, service query management and Peer-to-Peer-based query dissemination. By adding a comfortable graphical interface on top of our middleware, we(More)
Wireless ad-hoc networks are commonly supposed to be a key technology for future ubiquitous computing environments. The dynamic nature of such networks demands mechanisms that allow the users to assess the availability of given network connections. In this paper we present a novel connection stability heuristic based on neighborhood information of(More)
  • 1