Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications
暂无分享,去创建一个
Jordi Forné | Silvia Puglisi | David Rebollo-Monedero | D. Rebollo-Monedero | J. Forné | Silvia Puglisi
[1] Zhu Wang,et al. Discovering and Profiling Overlapping Communities in Location-Based Social Networks , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[2] Eran Toch,et al. Locality and privacy in people-nearby applications , 2013, UbiComp.
[3] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[4] Calton Pu,et al. Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.
[5] Calton Pu,et al. Large Online Social Footprints--An Emerging Threat , 2009, 2009 International Conference on Computational Science and Engineering.
[6] Yih-Chun Hu,et al. Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.
[7] Alessandro Acquisti,et al. Predicting Social Security numbers from public data , 2009, Proceedings of the National Academy of Sciences.
[8] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[9] Radhika Nagpal,et al. Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network , 2003, IPSN.
[10] M. Cao,et al. Localization with Imprecise Distance Information in Sensor Networks , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[11] Anupam Joshi,et al. @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.
[12] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[13] Oliver Brdiczka,et al. Activity duration analysis for context-aware services using foursquare check-ins , 2012, Self-IoT '12.
[14] Stefan Saroiu,et al. Keeping information safe from social networking apps , 2012, WOSN '12.
[15] Sree Hari Krishnan Parthasarathi,et al. Exploiting innocuous activity for correlating users across sites , 2013, WWW.
[16] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[17] Timothy W. Finin,et al. Preserving Privacy in Context-Aware Systems , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.
[18] Roksana Boreli,et al. Is more always merrier?: a deep dive into online social footprints , 2012, WOSN '12.