Protecting privacy with protocol stack virtualization


Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system. Building on previous work, we propose a relatively… (More)
DOI: 10.1145/1456403.1456416


2 Figures and Tables

Cite this paper

@inproceedings{Lindqvist2008ProtectingPW, title={Protecting privacy with protocol stack virtualization}, author={Janne Lindqvist and Juha-Matti Tapio}, booktitle={WPES}, year={2008} }