Nothing Special   »   [go: up one dir, main page]

Skip to main content

Anonymous and Confidential Communications from an IP Addressless Computer

  • Conference paper
  • First Online:
Handheld and Ubiquitous Computing (HUC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1707))

Included in the following conference series:

Abstract

Anonymizers based on a mediating computer interposed between the sender and the receiver of an e-mail message have been used for several years by senders of e-mail messages who do not wish to disclose their identity to the receivers. In this model, the strength of the system to protect the identity of the sender depends on the ability and willingness of the mediator to keep the secret. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet which does not depend on a third party. Our idea departs from the traditional approach by sending the anonymous messages from an Internet wireless and addressless computer, such as a Personal Digital Assistant (PDA) bridged to the Internet by a Mobile Support Station (MSS).

PhD student supported by The National Autonomous University of Mexico

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. John Ioannidis, Dan Duchamp, and Jr. Gerald Q. Maguire. IP-based protocols for mobile internerworking. In SIGCOM’91 Conference. Communications Architecture and Protocols, Zurich, Swizerland, September 3–6 1991. ACM.

    Google Scholar 

  2. N. Asokan, Phillipe A. Janson, Michael Steiner, and Michael Waidner. The state of the art in electronic payment systems. Computer, 30(9), September 1997.

    Google Scholar 

  3. Bruce Schneider. Applied Cryptography. John Wiley & Sons, Inc., second edition, 1996.

    Google Scholar 

  4. Gerard J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Molina-Jiménez, C., Marshall, L. (1999). Anonymous and Confidential Communications from an IP Addressless Computer. In: Gellersen, HW. (eds) Handheld and Ubiquitous Computing. HUC 1999. Lecture Notes in Computer Science, vol 1707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48157-5_54

Download citation

  • DOI: https://doi.org/10.1007/3-540-48157-5_54

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66550-2

  • Online ISBN: 978-3-540-48157-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics