-
1
-
-
85076892739
-
-
Android 4.3’s Hidden App Permission Manager. http://www.androidpolice.com/2013/07/25/app- ops-android- 4- 3s- hidden- app- permission- manager-control- permissions- for- individual- apps/.
-
Android 4.3’S Hidden App Permission Manager
-
-
-
8
-
-
84873306298
-
-
Protocol Buffers. https://developers.google.com/ protocol- buffers/.
-
Protocol Buffers
-
-
-
9
-
-
85076915803
-
-
RunKeeper. http://www.runkeeper.com/.
-
-
-
-
11
-
-
85076880283
-
-
Under the Hood: Dalvik patch for Facebook for Android. https://www.facebook.com/notes/facebookengineering/under- the- hood- dalvik- patch- for-facebook- for- android/10151345597798920.
-
Dalvik Patch for Facebook for Android
-
-
-
12
-
-
84881124452
-
ProtectMyPrivacy: Detecting and mitigating privacy leaks on ios devices using crowdsourcing
-
AGARWAL, Y., AND HALL, M. Protectmyprivacy: Detecting and mitigating privacy leaks on ios devices using crowdsourcing. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13, pp. 97–110.
-
Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13
, pp. 97-110
-
-
Agarwal, Y.1
Hall, M.2
-
14
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
AVIV, A. J., SAPP, B., BLAZE, M., AND SMITH, J. M. Practicality of accelerometer side channels on smartphones. In Proceedings of the 28th Annual Computer Security Applications Conference (2012), ACSAC’12, pp. 41–50.
-
Proceedings of the 28th Annual Computer Security Applications Conference (2012), ACSAC’12
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
15
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
BADEN, R., BENDER, A., SPRING, N., BHATTACHARJEE, B., AND STARIN, D. Persona: An online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (2009), SIGCOMM’09, pp. 135–146.
-
Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (2009), SIGCOMM’09
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
16
-
-
35048842427
-
Activity recognition from user-annotated acceleration data
-
BAO, L., AND INTILLE, S. S. Activity recognition from user-annotated acceleration data. Pervasive LNCS 3001 (2004), 1–17.
-
(2004)
Pervasive LNCS
, vol.3001
, pp. 1-17
-
-
Bao, L.1
Intille, S.S.2
-
17
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
BARRERA, D., KAYACIK, H. G., VAN OORSCHOT, P. C., AND SOMAYAJI, A. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security (2010), ACM, pp. 73–84.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
18
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
BERESFORD, A. R., RICE, A., SKEHIN, N., AND SOHAN, R. Mockdroid: Trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (2011), HotMobile’11, pp. 49–54.
-
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (2011), HotMobile’11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
19
-
-
84872712564
-
Detecting dwelling in urban environments using GPS, wifi, and geolocation measurements
-
BROUWERS, N., AND WOEHRLE, M. Detecting dwelling in urban environments using gps, wifi, and geolocation measurements. In Proc. 2nd Intl Workshop on Sensing Applications on Mobile Phones (2011), pp. 1–5.
-
(2011)
Proc. 2nd Intl Workshop on Sensing Applications on Mobile Phones
, pp. 1-5
-
-
Brouwers, N.1
Woehrle, M.2
-
20
-
-
84893289336
-
Protecting data against unwanted inferences
-
CHAKRABORTY, S., BITOUZÉ, N., SRIVASTAVA, M., AND DOLECEK, L. Protecting data against unwanted inferences. In Information Theory Workshop (ITW), 2013 IEEE (2013), pp. 1–5.
-
(2013)
Information Theory Workshop (ITW), 2013 IEEE
, pp. 1-5
-
-
Chakraborty, S.1
Bitouzé, N.2
Srivastava, M.3
Dolecek, L.4
-
21
-
-
84875481327
-
A framework for context-aware privacy of sensor data on mobile systems
-
CHAKRABORTY, S., RAGHAVAN, K. R., JOHNSON, M. P., AND SRIVASTAVA, M. B. A framework for context-aware privacy of sensor data on mobile systems. In Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (2013), HotMobile’13, pp. 11:1–11:6.
-
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (2013), HotMobile’13
-
-
Chakraborty, S.1
Raghavan, K.R.2
Johnson, M.P.3
Srivastava, M.B.4
-
22
-
-
84886601057
-
Ammon: A speech analysis library for analyzing affect, stress, and mental health on mobile phones
-
CHANG, D. F. K.-H., AND CANNY, J. Ammon: A speech analysis library for analyzing affect, stress, and mental health on mobile phones. Proceedings of PhoneSense 2011 (2011).
-
(2011)
Proceedings of PhoneSense 2011
-
-
Chang, D.F.K.-H.1
Canny, J.2
-
23
-
-
85076924540
-
-
HotOS
-
CHU, D., KANSAL, A., LIU, J., AND ZHAO, F. Mobile apps: it’s time to move up to condos. HotOS.
-
Mobile Apps: It’S Time to Move up to Condos
-
-
Chu, D.1
Kansal, A.2
Liu, J.3
Zhao, F.4
-
24
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
OSDI’10
-
ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (2010), OSDI’10, pp. 1–6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
25
-
-
74049155830
-
On lightweight mobile phone application certification
-
ENCK, W., ONGTANG, M., AND MCDANIEL, P. On lightweight mobile phone application certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), CCS’09, pp. 235–245.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), CCS’09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
26
-
-
78149290264
-
Open mHealth architecture: An engine for health care innovation
-
ESTRIN, D., AND SIM, I. Open mHealth Architecture: An Engine for Health Care Innovation. Science 330, 6005 (2010), 759–760.
-
(2010)
Science
, vol.330
, Issue.6005
, pp. 759-760
-
-
Estrin, D.1
Sim, I.2
-
27
-
-
80755187788
-
Android permissions demystified
-
CCS’11
-
FELT, A. P., CHIN, E., HANNA, S., SONG, D., AND WAGNER, D. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security (2011), CCS’11, pp. 627–638.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
28
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
FELT, A. P., HA, E., EGELMAN, S., HANEY, A., CHIN, E., AND WAGNER, D. Android permissions: User attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (2012), SOUPS’12, pp. 3:1–3:14.
-
Proceedings of the Eighth Symposium on Usable Privacy and Security (2012), SOUPS’12
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
29
-
-
84904106230
-
Rsa key extraction via low-bandwidth acoustic cryptanalysis
-
Report 2013/857
-
GENKIN, D., SHAMIR, A., AND TROMER, E. Rsa key extraction via low-bandwidth acoustic cryptanalysis. Cryptology ePrint Archive, Report 2013/857, 2013.
-
(2013)
Cryptology ePrint Archive
-
-
Genkin, D.1
Shamir, A.2
Tromer, E.3
-
30
-
-
84862643033
-
Maskit: Privately releasing user context streams for personalized mobile applications
-
GÖTZ, M., NATH, S., AND GEHRKE, J. Maskit: Privately releasing user context streams for personalized mobile applications. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data (2012), SIGMOD’12, pp. 289–300.
-
Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data (2012), SIGMOD’12
, pp. 289-300
-
-
Götz, M.1
Nath, S.2
Gehrke, J.3
-
31
-
-
84863297774
-
Accomplice: Location inference using accelerometers on smartphones
-
HAN, J., OWUSU, E., NGUYEN, L., PERRIG, A., AND ZHANG, J. Accomplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on (2012), pp. 1–9.
-
(2012)
Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on
, pp. 1-9
-
-
Han, J.1
Owusu, E.2
Nguyen, L.3
Perrig, A.4
Zhang, J.5
-
32
-
-
85076916782
-
Flow permissions for android
-
HOLAVANALLI, S., MANUEL, D., NANJUNDASWAMY, V., ROSENBERG, B., AND SHEN, F. Flow permissions for android. In Tech Report.
-
Tech Report
-
-
Holavanalli, S.1
Manuel, D.2
Nanjundaswamy, V.3
Rosenberg, B.4
Shen, F.5
-
33
-
-
80755187778
-
These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications
-
CCS’11
-
HORNYACK, P., HAN, S., JUNG, J., SCHECHTER, S., AND WETHERALL, D. These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (2011), CCS’11, pp. 639–652.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
34
-
-
84869811164
-
-
JEON, J., MICINSKI, K. K., VAUGHAN, J. A., REDDY, N., ZHU, Y., FOSTER, J. S., AND MILLSTEIN, T. Dr. android and mr. hide: Fine-grained security policies on unmodified android.
-
Dr. Android and Mr. Hide: Fine-Grained Security Policies on Unmodified Android
-
-
Jeon, J.1
Micinski, K.K.2
Vaughan, J.A.3
Reddy, N.4
Zhu, Y.5
Foster, J.S.6
Millstein, T.7
-
35
-
-
78650885484
-
SensLoc: Sensing everyday places and paths using less energy
-
KIM, D. H., KIM, Y., ESTRIN, D., AND SRIVASTAVA, M. B. Sensloc: Sensing everyday places and paths using less energy. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (2010), SenSys’10, pp. 43–56.
-
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (2010), SenSys’10
, pp. 43-56
-
-
Kim, D.H.1
Kim, Y.2
Estrin, D.3
Srivastava, M.B.4
-
37
-
-
67650320950
-
A survey of computational location privacy
-
Aug
-
KRUMM, J. A survey of computational location privacy. Personal Ubiquitous Comput. 13, 6 (Aug. 2009), 391–399.
-
(2009)
Personal Ubiquitous Comput
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
38
-
-
85076688797
-
Πbox: A platform for privacy-preserving apps
-
NSDI’13
-
LEE, S., WONG, E. L., GOEL, D., DAHLIN, M., AND SHMATIKOV, V. πbox: A platform for privacy-preserving apps. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (2013), NSDI’13, pp. 501–514.
-
(2013)
Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation
, pp. 501-514
-
-
Lee, S.1
Wong, E.L.2
Goel, D.3
Dahlin, M.4
Shmatikov, V.5
-
39
-
-
84873449020
-
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
-
LIU, B., JIANG, Y., SHA, F., AND GOVINDAN, R. Cloud-enabled privacy-preserving collaborative learning for mobile sensing. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (2012), Sensys’12, pp. 57–70.
-
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (2012), Sensys’12
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
40
-
-
84867454858
-
Stresssense: Detecting stress in unconstrained acoustic environments using smartphones
-
Ubicomp’12
-
LU, H., FRAUENDORFER, D., RABBI, M., MAST, M. S., CHITTARANJAN, G. T., CAMPBELL, A. T., GATICA-PEREZ, D., AND CHOUDHURY, T. Stresssense: Detecting stress in unconstrained acoustic environments using smartphones. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (2012), Ubicomp’12, pp. 351–360.
-
(2012)
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
, pp. 351-360
-
-
Lu, H.1
Frauendorfer, D.2
Rabbi, M.3
Mast, M.S.4
Chittaranjan, G.T.5
Campbell, A.T.6
Gatica-Perez, D.7
Choudhury, T.8
-
41
-
-
70450267511
-
Soundsense: Scalable sound sensing for people-centric applications on mobile phones
-
LU, H., PAN, W., LANE, N. D., CHOUDHURY, T., AND CAMPBELL, A. T. Soundsense: Scalable sound sensing for people-centric applications on mobile phones. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (2009), MobiSys’09, pp. 165–178.
-
Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (2009), MobiSys’09
, pp. 165-178
-
-
Lu, H.1
Pan, W.2
Lane, N.D.3
Choudhury, T.4
Campbell, A.T.5
-
42
-
-
80755143996
-
Sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
-
CCS’11
-
MARQUARDT, P., VERMA, A., CARTER, H., AND TRAYNOR, P. (sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM Conference on Computer and Communications Security (2011), CCS’11, pp. 551–562.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 551-562
-
-
Marquardt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
43
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
MILUZZO, E., VARSHAVSKY, A., BALAKRISHNAN, S., AND CHOUDHURY, R. R. Tapprints: Your finger taps have fingerprints. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (2012), MobiSys’12, pp. 323–336.
-
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (2012), MobiSys’12
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
44
-
-
79951609419
-
Personal data vaults: A locus of control for personal data streams
-
Co-NEXT’10
-
MUN, M., HAO, S., MISHRA, N., SHILTON, K., BURKE, J., ESTRIN, D., HANSEN, M., AND GOVINDAN, R. Personal data vaults: A locus of control for personal data streams. In Proceedings of the 6th International COnference (2010), Co-NEXT’10, pp. 17:1–17:12.
-
Proceedings of the 6th International COnference (2010)
-
-
Mun, M.1
Hao, S.2
Mishra, N.3
Shilton, K.4
Burke, J.5
Estrin, D.6
Hansen, M.7
Govindan, R.8
-
45
-
-
77954487766
-
APEX: Extending android permission model and enforcement with user-defined runtime constraints
-
NAUMAN, M., KHAN, S., AND ZHANG, X. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (2010), ACM, pp. 328–332.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
46
-
-
84881162327
-
AudiTeuR: A mobile-cloud service platform for acoustic event detection on smartphones
-
NIRJON, S., DICKERSON, R. F., ASARE, P., LI, Q., HONG, D., STANKOVIC, J. A., HU, P., SHEN, G., AND JIANG, X. Auditeur: A mobile-cloud service platform for acoustic event detection on smartphones. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13, pp. 403–416.
-
Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13
, pp. 403-416
-
-
Nirjon, S.1
Dickerson, R.F.2
Asare, P.3
Li, Q.4
Hong, D.5
Stankovic, J.A.6
Hu, P.7
Shen, G.8
Jiang, X.9
-
47
-
-
84881178016
-
Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing
-
PARATE, A., CHIU, M.-C., GANESAN, D., AND MARLIN, B. M. Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13, pp. 83–96.
-
Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013), MobiSys’13
, pp. 83-96
-
-
Parate, A.1
Chiu, M.-C.2
Ganesan, D.3
Marlin, B.M.4
-
48
-
-
84867442764
-
Online pose classification and walking speed estimation using handheld devices
-
12
-
PARK, J.-G., PATEL, A., CURTIS, D., TELLER, S., AND LEDLIE, J. Online pose classification and walking speed estimation using handheld devices. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (2012), UbiComp ’12, pp. 113–122.
-
Proceedings of the 2012 ACM Conference on Ubiquitous Computing (2012), UbiComp
, pp. 113-122
-
-
Park, J.-G.1
Patel, A.2
Curtis, D.3
Teller, S.4
Ledlie, J.5
-
49
-
-
79959287100
-
Continuous inference of psychological stress from sensory measurements collected in the natural environment
-
PLARRE, K., RAIJ, A., HOSSAIN, S., ALI, A., NAKAJIMA, M., AL’ABSI, M., ERTIN, E., KAMARCK, T., KUMAR, S., SCOTT, M., SIEWIOREK, D., SMAILAGIC, A., AND WITTMERS, L. Continuous inference of psychological stress from sensory measurements collected in the natural environment. In Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on (2011), pp. 97–108.
-
(2011)
Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on
, pp. 97-108
-
-
Plarre, K.1
Raij, A.2
Hossain, S.3
Ali, A.4
Nakajima, M.5
Al’Absi, M.6
Ertin, E.7
Kamarck, T.8
Kumar, S.9
Scott, M.10
Siewiorek, D.11
Smailagic, A.12
Wittmers, L.13
-
50
-
-
78650018950
-
Emotionsense: A mobile phones based adaptive platform for experimental social psychology research
-
RACHURI, K. K., MUSOLESI, M., MASCOLO, C., RENTFROW, P. J., LONGWORTH, C., AND AUCINAS, A. Emotionsense: a mobile phones based adaptive platform for experimental social psychology research. In Proceedings of the 12th ACM international conference on Ubiquitous computing (2010), pp. 281–290.
-
(2010)
Proceedings of the 12th ACM International Conference on Ubiquitous Computing
, pp. 281-290
-
-
Rachuri, K.K.1
Musolesi, M.2
Mascolo, C.3
Rentfrow, P.J.4
Longworth, C.5
Aucinas, A.6
-
51
-
-
84862967294
-
Mconverse: Inferring conversation episodes from respiratory measurements collected in the field
-
WH’11
-
RAHMAN, M. M., ALI, A. A., PLARRE, K., AL’ABSI, M., ERTIN, E., AND KUMAR, S. mconverse: Inferring conversation episodes from respiratory measurements collected in the field. In Proceedings of the 2Nd Conference on Wireless Health (2011), WH’11, pp. 10:1–10:10.
-
(2011)
Proceedings of the 2Nd Conference on Wireless Health
-
-
Rahman, M.M.1
Ali, A.A.2
Plarre, K.3
Al’Absi, M.4
Ertin, E.5
Kumar, S.6
-
52
-
-
79958120360
-
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
-
CHI’11
-
RAIJ, A., GHOSH, A., KUMAR, S., AND SRIVASTAVA, M. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2011), CHI’11, pp. 11–20.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 11-20
-
-
Raij, A.1
Ghosh, A.2
Kumar, S.3
Srivastava, M.4
-
53
-
-
77749264950
-
Using mobile phones to determine transportation modes
-
A ND Mar
-
REDDY, S., MUN, M., BURKE, J., ESTRIN, D., AND HANSEN, MARK A ND SRIVASTAVA, M. Using mobile phones to determine transportation modes. ACM Trans. Sen. Netw. 6, 2 (Mar. 2010), 13:1–13:27.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
, Issue.2
-
-
Reddy, S.1
Mun, M.2
Burke, J.3
Estrin, D.4
Hansen, M.5
Srivastava, M.6
-
54
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
SSYM’01
-
SONG, D. X., WAGNER, D., AND TIAN, X. Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (2001), SSYM’01, pp. 25–25.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium - Volume
, vol.10
, pp. 25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
56
-
-
76749099371
-
Lockr: Better privacy for social networks
-
CoNEXT’09
-
TOOTOONCHIAN, A., SAROIU, S., GANJALI, Y., AND WOL-MAN, A. Lockr: Better privacy for social networks. In Proceedingsofthe5thInternationalConferenceonEmergingNetworking Experiments and Technologies (2009), CoNEXT’09, pp. 169–180.
-
(2009)
Proceedingsofthe5thInternationalConferenceonEmergingNetworking Experiments and Technologies
, pp. 169-180
-
-
Tootoonchian, A.1
Saroiu, S.2
Ganjali, Y.3
Wol-Man, A.4
-
58
-
-
84873477570
-
Accurate caloric expenditure of bicyclists using cellphones
-
ZHAN, A., CHANG, M., CHEN, Y., AND TERZIS, A. Accurate caloric expenditure of bicyclists using cellphones. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (2012), SenSys’12, pp. 71–84.
-
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (2012), SenSys’12
, pp. 71-84
-
-
Zhan, A.1
Chang, M.2
Chen, Y.3
Terzis, A.4
|