-
1
-
-
80051872532
-
-
http://www.foursquare.com.
-
-
-
-
2
-
-
80051867199
-
-
http://www.gowalla.com.
-
-
-
-
3
-
-
80051894971
-
-
http://www.gypsii.com.
-
-
-
-
4
-
-
80051877222
-
-
http://www.loopt.com.
-
-
-
-
5
-
-
80051895814
-
-
http://www.brightkite.com.
-
-
-
-
6
-
-
80051881158
-
-
http://www.skylab-mobilesystems.com/en/products/gps-sim.html.
-
-
-
-
7
-
-
80051891601
-
-
http://www.zylsoft.com/vgps.htm.
-
-
-
-
8
-
-
80051888655
-
-
http://www.avangardo.com/index.php?option=com-content&view= article&id=47&Itemid=55.
-
-
-
-
9
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
IEEE
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to de-anonymize social network users, " in 2010 IEEE Symposium on Security and Privacy. IEEE, 2010, pp. 223-238.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
11
-
-
35348837824
-
Parallel crawling for online social networks
-
DOI 10.1145/1242572.1242809, 16th International World Wide Web Conference, WWW2007
-
D. Chau, S. Pandit, S. Wang, and C. Faloutsos, "Parallel crawling for online social networks, " in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, pp. 1283-1284. (Pubitemid 47582422)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 1283-1284
-
-
Chau, D.H.1
Pandit, S.2
Wang, S.3
Faloutsos, C.4
-
13
-
-
70349088576
-
Secure and precise location verification using distance bounding and simultaneous multilateration
-
ACM
-
J. Chiang, J. Haas, and Y. Hu, "Secure and precise location verification using distance bounding and simultaneous multilateration, " in Proceedings of the second ACM conference on Wireless network security. ACM, 2009, pp. 181-192.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 181-192
-
-
Chiang, J.1
Haas, J.2
Hu, Y.3
-
14
-
-
1542317849
-
Secure verification of location claims
-
ACM
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims, " in Proceedings of the 2nd ACM workshop on Wireless security. ACM, 2003, pp. 1-10.
-
(2003)
Proceedings of the 2nd ACM Workshop on Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
15
-
-
77951539275
-
Where's that phone?: Geolocating IP addresses on 3G networks
-
ACM
-
M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, "Where's that phone?: geolocating IP addresses on 3G networks, " in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, 2009, pp. 294-300.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 294-300
-
-
Balakrishnan, M.1
Mohomed, I.2
Ramasubramanian, V.3
-
16
-
-
0038756104
-
Wireless internet access: 3G vs. WiFi?* 1
-
W. Lehr and L. McKnight, "Wireless Internet access: 3G vs. WiFi?* 1, " Telecommunications Policy, vol. 27, no. 5-6, pp. 351-370, 2003.
-
(2003)
Telecommunications Policy
, vol.27
, Issue.5-6
, pp. 351-370
-
-
Lehr, W.1
Mcknight, L.2
-
17
-
-
33748945038
-
An experimental study of localization using wireless ethernet
-
DOI 10.1007/10991459-15, Robotics: Recent Advances in Research and Applications
-
A. Howard, S. Siddiqi, and Sukhatme, "An experimental study of localization using wireless ethernet, " in Field and Service Robotics. Springer, 2006, pp. 145-153. (Pubitemid 44430494)
-
(2006)
Springer Tracts in Advanced Robotics
, vol.24
, pp. 145-153
-
-
Howard, A.1
Siddiqi, S.2
Sukhatme, G.S.3
-
18
-
-
80051869723
-
-
http://www.dd-wrt.com.
-
-
-
-
20
-
-
85084161366
-
Tor: The secondgeneration onion router
-
USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router, " in Proceedings of the 13th conference on USENIX Security Symposium-Volume 13. USENIX Association, 2004, p. 21.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
21
-
-
26444473661
-
Messin' with Texas deriving mother's maiden names using public records
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
V. Griffith and M. Jakobsson, "Messinwith Texas Deriving Mothers Maiden Names Using Public Records, " in Applied Cryptography and Network Security. Springer, 2005, pp. 91-103. (Pubitemid 41422110)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 91-103
-
-
Griffith, V.1
Jakobsson, M.2
-
23
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
ACM
-
E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, " in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 531-540.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
|