Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

A novel Bluetooth low energy based system for spatial exploration in smart cities

M Boukhechba, A Bouzouane, S Gaboury… - Expert Systems with …, 2017 - Elsevier
Smart Cities are employing information and communication technologies in the quest for
sustainable economic development and the fostering of new forms of collective life. They …

11 user fingerprinting

J Pang, B Greenstein, R Gummadi, S Seshan… - Proceedings of the 13th …, 2007 - dl.acm.org
The ubiquity of 802.11 devices and networks enables anyone to track our every move with
alarming ease. Each 802.11 device transmits a globally unique and persistent MAC address …

On the optimal placement of mix zones

J Freudiger, R Shokri, JP Hubaux - International Symposium on Privacy …, 2009 - Springer
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …

[HTML][HTML] Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing.

TS Saponas, J Lester, C Hartung, S Agarwal… - USENIX Security …, 2007 - usenix.org
We analyze three new consumer electronic gadgets in order to gauge the privacy and
security trends in mass-market UbiComp devices. Our study of the Slingbox Pro uncovers a …

The {KNOB} is broken: Exploiting low entropy in the encryption key negotiation of bluetooth {BR/EDR}

D Antonioli, NO Tippenhauer… - 28th USENIX security …, 2019 - usenix.org
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The
attack allows a third party, without knowledge of any secret material (such as link and …

BLUFFS: Bluetooth forward and future secrecy attacks and defenses

D Antonioli - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Bluetooth is a pervasive technology for wireless communication. Billions of devices use it in
sensitive applications and to exchange private data. The security of Bluetooth depends on …

Inferring person-to-person proximity using WiFi signals

P Sapiezynski, A Stopczynski, DK Wind… - Proceedings of the …, 2017 - dl.acm.org
Today's societies are enveloped in an ever-growing telecommunication infrastructure. This
infrastructure offers important opportunities for sensing and recording a multitude of human …

Saving private addresses: An analysis of privacy issues in the bluetooth-low-energy advertising mechanism

G Celosia, M Cunche - Proceedings of the 16th EAI International …, 2019 - dl.acm.org
The Bluetooth Low Energy (BLE) protocol is being included in a growing number of
connected objects such as fitness trackers and headphones. As part of the service discovery …

Key negotiation downgrade attacks on bluetooth and bluetooth low energy

D Antonioli, NO Tippenhauer… - ACM Transactions on …, 2020 - dl.acm.org
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies
specified in the Bluetooth standard. The standard includes key negotiation protocols used to …