Change search
Link to record
Permanent link

Direct link
BETA
Andersson, Christer
Publications (10 of 16) Show all publications
Andersson, C. (2008). Design and Evaluation of anonymity Solutions for Mobile Networks. (Doctoral dissertation).
Open this publication in new window or tab >>Design and Evaluation of anonymity Solutions for Mobile Networks
2008 (English)Doctoral thesis, monograph (Other academic)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-18190 (URN)
Available from: 2013-01-21 Created: 2013-01-21 Last updated: 2018-01-11
Andersson, C., Martucci, L. A. & Fischer-Hübner, S. (2008). Privacy & Anonymity in Mobile Ad Hoc Networks. In: Yan Zhang, Jun Zheng & Miao Ma (Ed.), Handbook of Research on Wireless Security. IGI Global
Open this publication in new window or tab >>Privacy & Anonymity in Mobile Ad Hoc Networks
2008 (English)In: Handbook of Research on Wireless Security / [ed] Yan Zhang, Jun Zheng & Miao Ma, IGI Global , 2008Chapter in book (Other academic)
Place, publisher, year, edition, pages
IGI Global, 2008
National Category
Computer Sciences
Identifiers
urn:nbn:se:kau:diva-1954 (URN)10.4018/978-1-59904-899-4 (DOI)9781599048994 (ISBN)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-06-04Bibliographically approved
Andersson, C., Martucci, L. & Fischer Hübner, S. (2008). Privacy and Anonymity in Mobile Ad Hoc Networks. In: David Taniar (Ed.), Mobile Computing: Concepts, Methodologies, Tools, and Applications: . Information Science Reference
Open this publication in new window or tab >>Privacy and Anonymity in Mobile Ad Hoc Networks
2008 (English)In: Mobile Computing: Concepts, Methodologies, Tools, and Applications / [ed] David Taniar, Information Science Reference , 2008Chapter in book (Refereed)
Place, publisher, year, edition, pages
Information Science Reference, 2008
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-22575 (URN)
Available from: 2013-01-22 Created: 2013-01-22 Last updated: 2018-06-04
Fischer Hübner, S., Andersson, C. & Panchenko, A. (2007). Practical Anonymous Communication on the Mobile Internet using TOR. Paper presented at Proceedings of the 3rd International Workshop on the Value of Security through Collaboration (SECOVAL 2007). Paper presented at Proceedings of the 3rd International Workshop on the Value of Security through Collaboration (SECOVAL 2007). IEEE Xplore Digital Library
Open this publication in new window or tab >>Practical Anonymous Communication on the Mobile Internet using TOR
2007 (English)Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE Xplore Digital Library, 2007
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-22517 (URN)
Conference
Proceedings of the 3rd International Workshop on the Value of Security through Collaboration (SECOVAL 2007)
Available from: 2013-01-22 Created: 2013-01-22 Last updated: 2018-06-04
Martucci, L. A., Andersson, C. & Fischer-Hübner, S. (2006). Chameleon and the Identity-Anonymity Paradox: Anonymity in Mobile Ad Hoc Networks. Paper presented at Proceedings of the Internation Workshop on Security (IWSEC 2006), Kyoto, Japan. Paper presented at Proceedings of the Internation Workshop on Security (IWSEC 2006), Kyoto, Japan.
Open this publication in new window or tab >>Chameleon and the Identity-Anonymity Paradox: Anonymity in Mobile Ad Hoc Networks
2006 (English)Conference paper, Published paper (Refereed)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-17616 (URN)
Conference
Proceedings of the Internation Workshop on Security (IWSEC 2006), Kyoto, Japan
Available from: 2013-01-21 Created: 2013-01-21 Last updated: 2018-01-11
Martucci, L. A., Andersson, C. & Fischer-Hübner, S. (2006). Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis.
Open this publication in new window or tab >>Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis
2006 (English)Report (Refereed)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-24992 (URN)
Available from: 2013-01-22 Created: 2013-01-22 Last updated: 2018-01-11
Martucci, L. A., Andersson, C., Schreurs, W. & Fischer-Hübner, S. (2006). Trusted Server Model for Privacy-Enhanced Location Based Services. Paper presented at Proceedings of the 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linköping, Sweden. Paper presented at Proceedings of the 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linköping, Sweden.
Open this publication in new window or tab >>Trusted Server Model for Privacy-Enhanced Location Based Services
2006 (English)Conference paper, Published paper (Refereed)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-25074 (URN)
Conference
Proceedings of the 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linköping, Sweden
Available from: 2013-01-22 Created: 2013-01-22 Last updated: 2018-01-11
Andersson, C. (2005). Enhancing Privacy in Mobile Networks: Anonymity Solutions and Their Analysis. (Licentiate dissertation).
Open this publication in new window or tab >>Enhancing Privacy in Mobile Networks: Anonymity Solutions and Their Analysis
2005 (English)Licentiate thesis, monograph (Other academic)
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-18893 (URN)
Available from: 2013-01-21 Created: 2013-01-21 Last updated: 2018-01-11
Fischer Hübner, S., Andersson, C. & Holleboom, T. J. (2005). Framework V1: PRIME project deliverable D14.1a.
Open this publication in new window or tab >>Framework V1: PRIME project deliverable D14.1a
2005 (English)Report (Refereed)
Abstract [en]

This document establishes the Framework Version 1 for the PRIME (Privacy and Identity Management

for Europe) project, which is a holistic framework that provides a detailed map of privacy-enhancing

identity management: it defines the problem space, the vision of PRIME, terminology and concepts,

models for users, metaphors, application scenarios, the legal, social and technical options, possible

business cases, and the technical challenges. In particular, the framework also encompasses a technical

architecture that specifically focuses on how the various mechanisms can or must interrelate.

The PRIME Framework V1 describes work in progress and presents first project results that were

achieved after the first year of the project. It will be further elaborated and refined for the next PRIME

Framework versions.

National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-19449 (URN)
Available from: 2013-01-21 Created: 2013-01-21 Last updated: 2018-06-04
Danielsson, N. & Andersson, C. (2005). Introducing Users to Privacy and Identity Management in the Context of Usability Testing.
Open this publication in new window or tab >>Introducing Users to Privacy and Identity Management in the Context of Usability Testing
2005 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In today's information society, privacy-enhanced identity management can help users to control their personal spheres when makinguse of e-services. However, privacy is a difficult concept to visualise, and comprehensible and intuitive user interfaces are needed to make such systems usable and informative for normal users. Typically, usability tests are used as a means to achieve this. This paper describes how the concept of identity management was introduced to the test subjects before a series of tests on prototypes and mock-ups of user interfaces were conducted. One reason why this was necessary was to provide the test subjects with enough context information to be able to perform the tests. Both oral and written introductions have been used, as well as introductory films. This paper discusses how these introductions have evolved during the usability testing process, and it further elaborates on which kinds of introductions are most suitable for which kind of usability test.

National Category
Information Systems Computer Sciences
Research subject
Information Systems; Computer Science
Identifiers
urn:nbn:se:kau:diva-20542 (URN)
Projects
PRIME (Privacy and Identity Management for Europe)
Available from: 2013-01-21 Created: 2013-01-21 Last updated: 2018-01-11
Organisations

Search in DiVA

Show all publications