-
1
-
-
35348834249
-
Privacy in location-aware computing environments
-
D. Anthony, D. Kotz, and T. Henderson. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64-72, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 64-72
-
-
Anthony, D.1
Kotz, D.2
Henderson, T.3
-
3
-
-
2342484676
-
Location-based services for mobile telephony: A study of users' privacy concerns
-
L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In INTERACT, pages 702-712, 2003.
-
(2003)
INTERACT
, pp. 702-712
-
-
Barkhuus, L.1
Dey, A.2
-
6
-
-
84870711529
-
-
June
-
comScore Data Mine. US Smartphone Owners by Age. http://www. comscoredatamine.com/2011/06/us-smartphone-owners-by-age, June 2011.
-
(2011)
US Smartphone Owners by Age
-
-
-
7
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2005.
-
(2005)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
Lamarca, A.4
Tabert, J.5
Powledge, P.6
-
9
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
10
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2012.
-
(2012)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
11
-
-
80755164321
-
Backdoor in top iPhone games stole user data, suit claims
-
November
-
D. Goodin. Backdoor in top iPhone games stole user data, suit claims. The Register, November 2009.
-
(2009)
The Register
-
-
Goodin, D.1
-
12
-
-
80755187778
-
These aren't the droids you're looking for: Retrofiting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofiting Android to Protect Data from Imperious Applications. In ACM Conference on Computer and Communications Security (CCS), 2011.
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
13
-
-
33750337486
-
Developing privacy guidelines for social location disclosure applications and services
-
G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. D. Abowd. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS), 2005.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS)
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Chen, M.4
Abowd, G.D.5
-
16
-
-
84869015230
-
Understanding users' requirements for data protection in smartphones
-
I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov. Understanding Users' Requirements for Data Protection in Smartphones. In ICDE Workshop on Secure Data Management on Smartphones and Mobiles, 2012.
-
(2012)
ICDE Workshop on Secure Data Management on Smartphones and Mobiles
-
-
Muslukhov, I.1
Boshmaf, Y.2
Kuo, C.3
Lester, J.4
Beznosov, K.5
-
17
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proceedings of the IEEE Security & Privacy Symposium, 2012.
-
(2012)
Proceedings of the IEEE Security & Privacy Symposium
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.5
Cowan, C.6
-
19
-
-
80054081236
-
Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share
-
J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp), 2011.
-
(2011)
Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp)
-
-
Wiese, J.1
Kelley, P.G.2
Cranor, L.F.3
Dabbish, L.4
Hong, J.I.5
Zimmerman, J.6
|