-
1
-
-
84875543877
-
-
http
-
http://http://developer.android.com/guide/basics/what-is-android.html.
-
-
-
-
2
-
-
84875517838
-
-
github.com/gsbabil/PDroid-AOSP-JellyBean
-
github.com/gsbabil/PDroid-AOSP-JellyBean.
-
-
-
-
3
-
-
84875523894
-
-
http://funf.org.
-
-
-
-
4
-
-
84869415696
-
-
Poster: Model-based context privacy for personal data streams
-
S. Chakraborty, K. R. Raghavan, and M. Srivastava. Poster: Model-based context privacy for personal data streams. CCS, 2012.
-
(2012)
CCS
-
-
Chakraborty, S.1
Raghavan, K.R.2
Srivastava, M.3
-
5
-
-
85092638806
-
Mobile apps: It's time to move up to condos
-
D. Chu, A. Kansal, J. Liu, and F. Zhao. Mobile apps: it's time to move up to condos. HotOS, 2011.
-
(2011)
HotOS
-
-
Chu, D.1
Kansal, A.2
Liu, J.3
Zhao, F.4
-
6
-
-
67650655439
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: a survey of results. TAMC, 2008.
-
(2008)
TAMC
-
-
Dwork, C.1
-
7
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck and et al. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
-
8
-
-
82955204103
-
Implementing gentry's fully-homomorphic encryption scheme
-
C. Gentry and S. Halevi. Implementing gentry's fully-homomorphic encryption scheme. EUROCRYPT, 2011.
-
(2011)
EUROCRYPT
-
-
Gentry, C.1
Halevi, S.2
-
9
-
-
84877950290
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. TRUST, 2012.
-
(2012)
TRUST
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
10
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. STOC, 1985.
-
(1985)
STOC
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
11
-
-
78650728589
-
On the anonymity of home/work location pairs
-
P. Golle and K. Partridge. On the anonymity of home/work location pairs. Pervasive, 2009.
-
(2009)
Pervasive
-
-
Golle, P.1
Partridge, K.2
-
12
-
-
84862643033
-
Maskit: Privately releasing user context streams for personalized mobile applications
-
M. Götz, S. Nath, and J. Gehrke. Maskit: privately releasing user context streams for personalized mobile applications. SIGMOD, 2012.
-
(2012)
SIGMOD
-
-
Götz, M.1
Nath, S.2
Gehrke, J.3
-
15
-
-
84875515212
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
-
J. Lin, N. Sadeh, S. Amini, J. Lindqvist, J. I. Hong, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp, 2012.
-
(2012)
UbiComp
-
-
Lin, J.1
Sadeh, N.2
Amini, S.3
Lindqvist, J.4
Hong, J.I.5
Zhang, J.6
-
16
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
K. Liu, H. Kargupta, and J. Ryan. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. on Knowl. & Data Eng., 2006.
-
(2006)
IEEE Trans. on Knowl. & Data Eng.
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
19
-
-
77953213147
-
Myths and fallacies of "personally identifiable information"
-
A. Narayanan and V. Shmatikov. Myths and fallacies of "personally identifiable information". Commun. ACM, 2010.
-
(2010)
Commun. ACM
-
-
Narayanan, A.1
Shmatikov, V.2
-
20
-
-
77956270463
-
Predicting user activities in the sequence of mobile context for ambient intelligence environment using dynamic bayesian network
-
H.-S. Park and S.-B. Cho. Predicting user activities in the sequence of mobile context for ambient intelligence environment using dynamic bayesian network. In ICAART, 2010.
-
(2010)
ICAART
-
-
Park, H.-S.1
Cho, S.-B.2
-
21
-
-
84870561687
-
Override: A mobile privacy framework for context-driven perturbation and synthesis of sensor data streams
-
K. R. Raghavan, S. Chakraborty, and M. Srivastava. Override: A mobile privacy framework for context-driven perturbation and synthesis of sensor data streams. PhoneSense, 2012.
-
(2012)
PhoneSense
-
-
Raghavan, K.R.1
Chakraborty, S.2
Srivastava, M.3
-
22
-
-
77955690373
-
A theory of utility and privacy of data sources
-
L. Sankar, S. Rajagopalan, and V. Poor. A theory of utility and privacy of data sources. ISIT, 2010.
-
(2010)
ISIT
-
-
Sankar, L.1
Rajagopalan, S.2
Poor, V.3
-
23
-
-
84869476246
-
Deanonymizing mobility traces: Using social network as a side-channel
-
M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social network as a side-channel. CCS, 2012.
-
(2012)
CCS
-
-
Srivatsa, M.1
Hicks, M.2
-
25
-
-
85072741693
-
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
-
T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ICEC, 2003.
-
(2003)
ICEC
-
-
Vila, T.1
Greenstadt, R.2
Molnar, D.3
-
26
-
-
84864343215
-
Fast app launching for mobile devices using predictive user context
-
T. Yan, D. Chu, D. Ganesan, A. Kansal, and J. Liu. Fast app launching for mobile devices using predictive user context. MobiSys, 2012.
-
(2012)
MobiSys
-
-
Yan, T.1
Chu, D.2
Ganesan, D.3
Kansal, A.4
Liu, J.5
-
27
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. SFCS, 1986.
-
(1986)
SFCS
-
-
Yao, A.C.-C.1
|