The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly...
A Cooperative Intelligent Transportation System is a transportation system where involved stations can sense their environments and communicate with each other in order to take certain decisions. Many applications are being proposed such as cooperative crash avoidance. However, the information exchanged between the stations may lead an adversary to determine the identity and also the behavior of the...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
We are all people who have a definite location, but our intuitions about people and their locations are not always correct. Fortunately, researchers have been looking at how people behave with respect to location, and they have discovered surprising facts that do not necessarily match our assumptions. For example, as technologists, we tend to assume that people have strong concerns about their location...
Mobile sensing applications leverage sensors embedded in today's mobile phones to gather both user-centric and environmental data in unprecedented quantity and quality. The collection of sensor readings annotated with time and location information may however endanger users' privacy, as they may reveal their routines and habits. Our paper investigates different factors that may foster user contributions...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
As vehicular networks (a.k.a. VANETs) continue to mature, the benefits they promise come closer to reality. For this to happen, both security and privacy must be provided. Particularly in dense urban environments, novel methods of distributing the often changing identity (pseudonyms or PNs) of the vehicles is necessary in order to ensure vehicles have sufficient PNs. In this paper, we examine three...
The Twelfth Workshop on Mobile Computing Systems and Applications (HotMobile 2011) was held 1–2 March 2001 in Phoenix, Arizona. The program committee accepted 16 papers on a wide range of topics, including mobile advertising, security, privacy, and resource scarcity.
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
Privacy helps to establish personal autonomy and create individualism. Privacy is a state or condition of limited access to a person. In particular, information privacy relates to an individual's right to determine how, when, and to what extent information about the self will be released to another person or to an organization. It can be said that privacy is a much broader concept than security; privacy...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.