Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …
Privacy in targeted advertising: A survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks
Y Ma, Y Wu, J Li, J Ge - Information Sciences, 2020 - Elsevier
Balancing accountability and privacy has become extremely important in cyberspace, and
the Internet has evolved to be dominated by content transmission. Several research efforts …
the Internet has evolved to be dominated by content transmission. Several research efforts …
An architecture for accountable anonymous access in the internet-of-things network
Y Ma, Y Wu, J Ge, LI Jun - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet, more and more devices are being connected to
the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two …
the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two …
Information-theoretic security in stochastic control systems
P Venkitasubramaniam, J Yao… - Proceedings of the …, 2015 - ieeexplore.ieee.org
Infrastructural systems such as the electricity grid, healthcare, and transportation networks
today rely increasingly on the joint functioning of networked information systems and …
today rely increasingly on the joint functioning of networked information systems and …
Quantifying the effectiveness of mobile phone virus response mechanisms
E Van Ruitenbeek, T Courtney… - 37th Annual IEEE …, 2007 - ieeexplore.ieee.org
Viruses that infect smartphones are emerging as a new front in the fight against computer
viruses. In this paper, we model the propagation of mobile phone viruses in order to study …
viruses. In this paper, we model the propagation of mobile phone viruses in order to study …
Attacking anonymous web browsing at local area networks through browsing dynamics
The majority of current anonymous systems focus on improving anonymity at the network
and website level in order to defend against traffic analysis attacks. However, the …
and website level in order to defend against traffic analysis attacks. However, the …
Improving the efficiency of anonymous routing for MANETs
Anonymity of mobile devices and their data is an essential requirement to facilitate the
deployment of future Mobile Ad hoc Networks. The currently proposed anonymous routing …
deployment of future Mobile Ad hoc Networks. The currently proposed anonymous routing …
Hide and code: Session anonymity in wireless line networks with coded packets
H Sousa-Pinto, DE Lucani… - 2012 Information Theory …, 2012 - ieeexplore.ieee.org
The broadcast nature of the communication channel enables a malicious eavesdropper to
gain information about connectivity and active sessions in a multi-hop wireless network. This …
gain information about connectivity and active sessions in a multi-hop wireless network. This …
Investigating the trade-off between overhead and delay for full packet traffic privacy
A Iacovazzi, A Baiocchi - 2013 IEEE International Conference …, 2013 - ieeexplore.ieee.org
It has been demonstrated that traffic analysis can disclose information supposedly secured
by encrypted channels. Key feature of packetized traffic exploited to that purpose are packet …
by encrypted channels. Key feature of packetized traffic exploited to that purpose are packet …