Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
暂无分享,去创建一个
Robert K. Cunningham | Arkady Yerukhimovich | Rebecca Balebako | Jeffrey Stewart | Zev Winkelman | William Welser | Richard Shay | Ari Trachtenberg | Anne E. Boustead | Karlyn D. Stanley | Chad Spensky | Richard Housley | A. Trachtenberg | Rebecca Balebako | R. Cunningham | Arkady Yerukhimovich | Chad Spensky | Jeffrey Stewart | Zev Winkelman | Rick Housley | Richard Shay | W. Welser
[1] Konstantin Beznosov,et al. Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[2] Vaishali Patel,et al. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study , 2015, Journal of health communication.
[3] Charles V. Wright,et al. Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.
[4] L. Taylor. No place to hide? The ethics and analytics of tracking mobility using mobile phone data , 2016 .
[5] Chris Peters,et al. The daily you: How the new advertising industry is defining your identity and your worth , 2012, New Media Soc..
[6] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[7] Su Li,et al. Mobile Phones and Privacy , 2012 .
[8] Yanick Fratantonio,et al. ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[9] Patrick Traynor,et al. [8WashJLTech&Arts0245] Privacy and Security Concerns Associated with Mobile Money Applications in Africa , 2013 .
[10] Lorrie Faith Cranor,et al. "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.
[11] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[12] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[13] Lorrie Faith Cranor,et al. The Privacy and Security Behaviors of Smartphone App Developers , 2014 .
[14] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[15] Patrick D. McDaniel,et al. Bloatware Comes to the Smartphone , 2012, IEEE Security & Privacy.
[16] Willis H. Ware. RAND and the Information Evolution: A History in Essays and Vignettes , 2008 .