Privacy in mobile technology for personal healthcare
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …
survey, we examine the privacy requirements of mobile computing technologies that have …
A novel Bluetooth low energy based system for spatial exploration in smart cities
M Boukhechba, A Bouzouane, S Gaboury… - Expert Systems with …, 2017 - Elsevier
Smart Cities are employing information and communication technologies in the quest for
sustainable economic development and the fostering of new forms of collective life. They …
sustainable economic development and the fostering of new forms of collective life. They …
11 user fingerprinting
The ubiquity of 802.11 devices and networks enables anyone to track our every move with
alarming ease. Each 802.11 device transmits a globally unique and persistent MAC address …
alarming ease. Each 802.11 device transmits a globally unique and persistent MAC address …
On the optimal placement of mix zones
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
[HTML][HTML] Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing.
We analyze three new consumer electronic gadgets in order to gauge the privacy and
security trends in mass-market UbiComp devices. Our study of the Slingbox Pro uncovers a …
security trends in mass-market UbiComp devices. Our study of the Slingbox Pro uncovers a …
The {KNOB} is broken: Exploiting low entropy in the encryption key negotiation of bluetooth {BR/EDR}
D Antonioli, NO Tippenhauer… - 28th USENIX security …, 2019 - usenix.org
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The
attack allows a third party, without knowledge of any secret material (such as link and …
attack allows a third party, without knowledge of any secret material (such as link and …
BLUFFS: Bluetooth forward and future secrecy attacks and defenses
D Antonioli - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Bluetooth is a pervasive technology for wireless communication. Billions of devices use it in
sensitive applications and to exchange private data. The security of Bluetooth depends on …
sensitive applications and to exchange private data. The security of Bluetooth depends on …
Inferring person-to-person proximity using WiFi signals
Today's societies are enveloped in an ever-growing telecommunication infrastructure. This
infrastructure offers important opportunities for sensing and recording a multitude of human …
infrastructure offers important opportunities for sensing and recording a multitude of human …
Saving private addresses: An analysis of privacy issues in the bluetooth-low-energy advertising mechanism
G Celosia, M Cunche - Proceedings of the 16th EAI International …, 2019 - dl.acm.org
The Bluetooth Low Energy (BLE) protocol is being included in a growing number of
connected objects such as fitness trackers and headphones. As part of the service discovery …
connected objects such as fitness trackers and headphones. As part of the service discovery …
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
D Antonioli, NO Tippenhauer… - ACM Transactions on …, 2020 - dl.acm.org
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies
specified in the Bluetooth standard. The standard includes key negotiation protocols used to …
specified in the Bluetooth standard. The standard includes key negotiation protocols used to …