The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in roaming scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract...
In road networks, k-Range Nearest Neighbor (kRNN) queries locate the k-nearest neighbors for every point on the road segments that are within a given query region, based on the network distance. This is an important task, because the user's location information may not be accurate, furthermore, users may be unwilling to reveal their exact location for privacy reasons. Therefore, in this specific situation,...
Mobile users access location services from a location based server. While doing so, the user's privacy is at risk. The server has access to all details about the user. Example the recently visited places, the type of information he accesses. We have presented synergetic technique to safeguard location privacy of users accessing location-based services via mobile devices. Mobile devices have a capability...
Location-based messaging applications (LMAs), a kind of messaging applications for mobile devices which enable users to connect with people based on their geographical locations, have recently experienced a huge popularity growth. The killer feature in LMAs that embodies the concept of geo-based instant messaging, named people nearby, allows users at any place to search and communicate with other...
In today's era everyone has a smart phone and with increase use of smart phone applications available in market, raise the risk of leaking crucial information about the user and increasing the risk of privacy breach. In this paper, we are analyzing the social relationship leakage of user through such applications which uses phones Global Positioning System (GPS) data. We specifically worked on latitude-longitude...
People from across the world are switching from traditional cell phones to more complex and connected smart phones. The invasion of smart phone has revolutionized the way we live. The smart phone technology has become like a phantom limb for its worldwide users. But the problems regarding smart phone security and contact synchronization are yet to be solved. In case, you lost your smart phone or changed...
Mobile device interaction with users, it is providing various purposes such as location service, road map service, traffic information service etc. It has help to user and connect to the various search engines. Because the search query is limited to small words dislike those used when interacting with various search engines through computers. This leads to drawback in good communication between the...
This paper reports on a study of mobile phone usage by young people in the UK tertiary education sector. Responses from 397 respondents were analysed to explore the attitudes of young people towards data security issues for mobile devices. Results from the comparative analysis found that there were significant differences in data security risk concerns across ethnic groups. Those who reported extrovert...
Location-based services mobile applications are becoming increasingly prevalent to the large population of semi-literate users living in emerging economies due to the low costs and ubiquity. However, usage of location-based services is still threatened by information privacy concerns. Studies typically only addressed how to mitigate information privacy concerns for the literate users and not the semi-literate...
Information technology has been used in diverse ways. It has been utilized to reduce costs in the public sector and increase consumer satisfaction in the private sector. Technology may also be instrumental in improving individuals' healthy behaviors. For instance, statistics suggest that technology-based interventions may promote healthy sexual behaviors, however, few studies have explored willingness...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy of their personal information and location data. However, research has generated few results based on actual information disclosure and even less that is based on longitudinal behavior. The purpose of this study is to execute a unique and authentic field experiment involving real risks and consumer behaviors...
The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten...
Although Quality of Experience (QoE) is pushed forward as a crucial concept in the context of the migration of services to the cloud, only a few studies so far have investigated cloud QoE from a users' point of view. This paper shares insights from an exploratory study on use- and QoE-related aspects of personal cloud services and applications. More concretely, we conducted an online survey (N= 349)...
Location-tracking is a major privacy problem, especially with high penetration of smart-phones and GPS-enabled devices around the world. In this paper, we propose a Hybrid and Social-aware Location-Privacy in Opportunistic mobile social networks (HSLPO), a collaborative and distributed obfuscation protocol that offers location-privacy k-anonymity. HSLPO discovers the users' own social network and...
As much of the web information nowadays is published by roaming mobile users, and these mobile users may get services from various foreign agents, security, privacy and authentication are important for the roaming service in global mobility networks. In 2011, Chen et al. proposed a lightweight and provably secure user authentication scheme with anonymity for roaming service. We first show that their...
To simulate crowds at mass events, realistic movement data of people is required. Despite their limited capacity for approximating real human mobility, synthetic movement models are traditionally used for this purpose. More realistic simulations can be achieved by using real-life movement data, gathered by observing people in the desired context. This paper presents a method for tracking people at...
This paper focuses on usage intention of the e-commerce based on ATM model. After empirical analysis, the following conclusions were made: Customer usage attitude has a significant positive impact on customer usage intension; customer perceived usefulness, perceived ease of use and perceived risk would significantly affect usage attitude. At the end, this paper proposes related suggestion about e-commerce.
In the past few years, the number of smartphone apps has grown at a tremendous rate. To compete in this market, both independent developers and large companies seek to improve the ratings of their apps. Therefore, understanding the user's perspective of mobile apps is extremely important. In this paper, we study the user's perspective of iOS apps by qualitatively analyzing app reviews. In total, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.