2018
DOI: 10.1007/978-3-658-23727-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Privatsphäre als inhärente Eigenschaft eines Kommunikationsnetzes am Beispiel einer Anonymisierungslösung für IPv6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…However, the MAC address space is limited to 2 48 , so any resulting pseudonyms are susceptible to brute-force attacks, as they are known as weak anonymized data [29]. Furthermore, it was shown by Demir et al how most commercial solutions using such mechanisms can be broken using off-the-shelf equipment [28], also reconfirmed by Marx et al [54] in a more recent work. This comes on top of the fact that a survey by Draghici and van Steen [31] discovered that not using privacy-protecting methods is far from being a rare event.…”
Section: Privacy Protection Directionsmentioning
confidence: 94%
“…However, the MAC address space is limited to 2 48 , so any resulting pseudonyms are susceptible to brute-force attacks, as they are known as weak anonymized data [29]. Furthermore, it was shown by Demir et al how most commercial solutions using such mechanisms can be broken using off-the-shelf equipment [28], also reconfirmed by Marx et al [54] in a more recent work. This comes on top of the fact that a survey by Draghici and van Steen [31] discovered that not using privacy-protecting methods is far from being a rare event.…”
Section: Privacy Protection Directionsmentioning
confidence: 94%