-
1
-
-
79952049588
-
Policy extension for data access control
-
Japan
-
Arunkumar S, Raghavendra A, Weerasinghe1 D, Patel D, Rajarajan M, Policy extension for data access control. In: Proceedings of 6th IEEE workshop on secure network protocols (NPSec), Japan,2010. p. 55-60.
-
(2010)
Proceedings of 6th IEEE Workshop on Secure Network Protocols (NPSec)
, pp. 55-60
-
-
Arunkumar, S.1
Raghavendra, A.2
Weerasinghe, D.3
Patel, D.4
Rajarajan, M.5
-
5
-
-
38049001302
-
Privacy and security in ubiquitous personalized applications
-
Brar A, Kay J, Privacy and security in ubiquitous personalized applications, Technical Report no. 561, (http://www.it.usyd.edu.au/research/tr/tr561.pdf),2004.
-
(2004)
Technical Report No. 561
-
-
Brar, A.1
Kay, J.2
-
6
-
-
84953932908
-
-
BuddyMob. Retrieved from
-
BuddyMob 2009. Retrieved from (http://www.buddymob.com/)
-
(2009)
-
-
-
7
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
New York, NY, USA, (ACM)
-
Cai L, Machiraju S, Chen H, Defending against sensor-sniffing attacks on mobile phones. In: Proceedings of the 1st ACM workshop on networking, systems, and applications for mobile handhelds (MobiHeld '09), New York, NY, USA, (ACM), 2009. p. 31-36.
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld '09)
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
8
-
-
84953932909
-
-
GFindster. GFindster review 2008. Retrieved from
-
GFindster. GFindster review 2008. Retrieved from (http://www.androidapps.com/t/gfindster)
-
-
-
-
9
-
-
84953932910
-
-
IMEasy. Introduction to Hi AIM 2008. Retrieved from.
-
IMEasy. Introduction to Hi AIM 2008. Retrieved from (http://im-easy.com/).
-
-
-
-
11
-
-
80052189649
-
A Hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data
-
Deivanai.P, Vedha.J. Jesu Nayahi, V.Kavitha, A Hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data. In: Proceedings of the IEEE-international conference on recent trends in information technology, ICRTIT, 2011.
-
(2011)
Proceedings of the IEEE-international Conference on Recent Trends in Information Technology, ICRTIT
-
-
Deivanai, P.1
Nayahi, J.2
Vedha, J.3
Kavitha, V.4
-
12
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck W, Gilbert P, Chun B-G, Cox LP, Jung J,McDaniel P, et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX symposium on operating systems design and implementation (OSDI'10), 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
-
17
-
-
35649010086
-
Mobihide: A mobile peer-to-peer system for anonymous location-based queries
-
Ghinital, G Kalnis, P, Skiadopoulos S, Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the international symposium on advances in spatial and temporal databases, SSTD, 2007.
-
(2007)
Proceedings of the International Symposium on Advances in Spatial and Temporal Databases, SSTD
-
-
Ghinital, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
18
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
Q He, D Wu, and P Khosla Quest for personal control over mobile location privacy IEEE Commun Mag 42 5 2004 130 136
-
(2004)
IEEE Commun Mag
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
20
-
-
67649510567
-
Privacy and fair information practices in ubiquitous environments, research challenges and future directions
-
M Karyda, and S Gritzalis Privacy and fair information practices in ubiquitous environments, research challenges and future directions Internet Res 19 2 2009 194 208
-
(2009)
Internet Res
, vol.19
, Issue.2
, pp. 194-208
-
-
Karyda, M.1
Gritzalis, S.2
-
22
-
-
33745761094
-
Protection of mobile location privacy by using blind signature
-
J Lia, YH Qi, PW Huang, MT Rong, and SH Li Protection of mobile location privacy by using blind signature J Zhejiang Univ Sci A 7 6 2006 984 989
-
(2006)
J Zhejiang Univ Sci A
, vol.7
, Issue.6
, pp. 984-989
-
-
Lia, J.1
Qi, Y.H.2
Huang, P.W.3
Rong, M.T.4
Li, S.H.5
-
23
-
-
84953932915
-
-
Mobiloco - location based services for mobile communities.
-
Mobiloco - location based services for mobile communities. (http://www.mobiloco.de).
-
-
-
-
25
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
E Kirda, S Jha, D Balzarotti, Springer of Lecture Notes in Computer Science
-
L Liu, G Yan, X Zhang, and S Chen Virusmeter: preventing your cellphone from spies E Kirda, S Jha, D Balzarotti, RAID Vol. 5758 2009 Springer 244 264 of Lecture Notes in Computer Science
-
(2009)
RAID
, vol.5758
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
26
-
-
84953863201
-
-
Springer Science plus Business Media, LLC
-
A Loukas, D Damopoulos, S A Menesidou, M E Skarkala, G Kambourakis, and S Gritzalis MILC: A secure and privacy-preserving mobile instant locator with chatting 2010 Springer Science plus Business Media, LLC
-
(2010)
MILC: A Secure and Privacy-preserving Mobile Instant Locator with Chatting
-
-
Loukas, A.1
Damopoulos, D.2
Menesidou, S.A.3
Skarkala, M.E.4
Kambourakis, G.5
Gritzalis, S.6
-
28
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
Mokbel MF, Chow CY, Aref WG, The new casper: query processing for location services without compromising privacy. In: Proceedings of the VLDB, 2006.
-
(2006)
Proceedings of the VLDB
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
30
-
-
77951578596
-
Preserving privacy in location-based mobile social applications
-
Puttaswamy K, Zhao B, Preserving privacy in location-based mobile social applications. In: Proceedings of the HotMobile, 2010. p. 1-6.
-
(2010)
Proceedings of the HotMobile
, pp. 1-6
-
-
Puttaswamy, K.1
Zhao, B.2
-
32
-
-
77951438833
-
Preserving anonymity of recurrent location-based queries
-
Riboni D, Pareschi L, Bettini C, Jajodia S, Preserving anonymity of recurrent location-based queries. In: Proceedings of the 16th international symposium on temporal representation and reasoning, IEEE computer society, 2009.
-
(2009)
Proceedings of the 16th International Symposium on Temporal Representation and Reasoning, IEEE Computer Society
-
-
Riboni, D.1
Pareschi, L.2
Bettini, C.3
Jajodia, S.4
-
33
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
Schlegel R, Zhang K, Zhou X, Intwala M,Kapadia A, Wang X, Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: Proceedings of the 18th annual network and distributed system security symposium (NDSS), 2011. p. 17-33.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
37
-
-
84925872423
-
Mobile micro-cloud: Application classification, mapping, and deployment
-
October
-
Wang S, Tu G-H, Ganti R, He T, Leung K, Tripp H, et al., Mobile micro-cloud: application classification, mapping, and deployment. In: Proceedings of the annual fall meeting of ITA (AMITA), October, 2013.
-
(2013)
Proceedings of the Annual Fall Meeting of ITA (AMITA)
-
-
Wang, S.1
Tu, G.-H.2
Ganti, R.3
He, T.4
Leung, K.5
Tripp, H.6
-
39
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3G smartphones
-
New York, NY, USA
-
Xu N, Zhang F, Luo Y, Jia W, Xuan D, Teng J, Stealthy video capturer: a new video-based spyware in 3G smartphones. In: Proceedings of the second ACM conference on wireless network security, WiSec '09, New York, NY, USA, 2009, p. 69-78.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security, WiSec '09
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
40
-
-
84970908741
-
-
(http://ec.europa.eu/justice/newsroom/data-protection/news/120125-en.htm), 2012
-
(2012)
-
-
-
41
-
-
84970897700
-
-
(http://www.bbc.co.uk/news/business-17192234), 2012
-
(2012)
-
-
-
42
-
-
84970903096
-
-
(http://www.bbc.co.uk/news/technology-17178954), 2012
-
(2012)
-
-
|