The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's world usage of location based services on mobile devices such as smartphones, tablet PCs and laptops has become progressively popular. Even though location based services are proved to be very useful and convenient, they may cause risk to the users' location privacy, because for the retrieval of useful information based on user's location, user has to send his/her present location and the...
Smartphone, as a personal device, has been widely used in people's daily life. As a result, it unavoidably contains user's private and sensitive information, such as financial accounts and social contacts. Unfortunately, recent studies have shown that fingerprint of sensors in smartphones can be used for tracking them, which leads to a significant threat to user's privacy. More importantly, speakers...
Push notification services provide reliable, energy efficient, store-and-forward messaging between servers and clients. This mode of communication is widely used, and sufficiently compelling for mobile devices that push notification services are integrated into operating systems. Unfortunately, push notification services today allow the service provider to practice censorship, surveillance, and location...
Distance learning is essential for students in remote areas. According to some investigations, there are more and more students taking online courses using smart phones. Nevertheless, there is a risk of privacy violation, if the distance learning system is not properly designed. In this paper, we design a privacy preserving scheme for distant learning, in which students use smart phones to access...
Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited...
Location-based service (LBS) is useful for many applications. However, LBS has raised serious concerns about users' location privacy. Utilizing the computation and storage capacity of smart phones, we propose a novel system architecture, called Location Privacy Protection for Smartphone (LPPS), to provide a privacy-preserving top-k query. LPPS does not rely on a trust third party (TTP), nor does it...
Localizing, identifying and authenticating the individual occupants is of paramount importance for the future intelligent buildings. Although the performance of outdoor positioning systems is sufficiently good, the indoor ones have still to converge to a universal interoperable technology. This paper proposes a hybrid, unified localization architecture for indoor and outdoor tracking of the building...
User uses smartphones for web surfing and browsing data. Many smartphones are embedded with inbuilt location aware system called GPS [Global Positioning System]. Using GPS user have to register and share his all private information to the LBS server. LBS is nothing but Location Based Service. Simply user sends the query to the LBS server. Then what is happening the LBS server gives a private information...
Location Based Services (LBS) are services offered by smart phone applications which use device location data to offer the location-related services. Privacy of location information is a major concern in LBS applications. This paper compares the location APIs of iOS with the IETF Geopriv architecture to determine what mechanisms are in place to protect location privacy of an iOS user. The focus of...
This paper discusses how born-digital cultural material can be opened up for research. We focus in particular on the grey area between private mobile phone data and its publication and use for research and beyond. We report on the results of the ‘Empowering Data Citizens’ (EDC) project, which is a collaboration between King's College London and the Open Data Institute. The work builds on the project...
Every organization whether it be an enterprise or academic institute, should maintain a proper documentation of attendance of staff or students for effective functioning of their organization. Generally there are two methods of taking attendance in a classroom- calling out students name one by one or taking students signature on paper. However each of those strategies are time consuming, inefficient...
The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or...
In previous few years, an incredible growth is witnessed in the popularity and pervasiveness of smart phones. It has also seen that new mobile applications are built day by day. These applications provide users functionality like social networking applications, games, and many more. Some of the mobile applications might be having a direct purchasing cost or be free but having an ad-support for revenue...
One of the most important characteristics of the traditional approaches of searching a missing object is a societal and infrastructural participatory crowd sensing where the crowds/participants 'consciously' opt to register the information in mind, and decide when, where, what, and how to sense and report. While the alert may extend to a broad community, the effectiveness of the crowd sensing doesn't...
Location based service is an indispensable part of today's mobile era. While it brings a lot of benefits to people, the breach to individual location privacy is always a concern and impedes the smooth development of location based service. A user can be easily tracked once she subscribes or uses the service from an untrusted location based service server. In this paper, we try to address this problem...
Quick Response (QR) codes are two dimensional barcodes that can be used to efficiently store small amount of data. They are increasingly used in all life fields, especially with the wide spread of smart phones which are used as QR code scanners. While QR codes have many advantages that make them very popular, there are several security issues and risks that are associated with them. Running malicious...
Nowadays cities invest more in their public services, and particularly digital ones, to improve their resident's quality of life and attract more people. Thus, new crowdsourcing services appear and they are based on contributions made by mobile users equipped with smartphones. For example, the respect of the traffic code is essential to ensure citizens' security and welfare in their city. In this...
Mobile device interaction with users, it is providing various purposes such as location service, road map service, traffic information service etc. It has help to user and connect to the various search engines. Because the search query is limited to small words dislike those used when interacting with various search engines through computers. This leads to drawback in good communication between the...
Mobile mashups promise great data aggregation and processing capabilities for all end users. During the data collection procedures, some data providers fail to protect confidentiality and privacy of user queries and transmit information in plain text. This enables attackers to eavesdrop on networks and compromise user information. Since mobile mashups can adopt server-side, client-side, or hybrid...
There is an increasing penetration of smart phones within enterprises. Most smart phone users now run both enterprise as well as personal applications simultaneously on their phones. However, most of the personal apps that are downloaded from public market places are hardly tested for enterprise grade security, and there have been instances of malware appearing in public markets that steal sensitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.