Privacy in targeted advertising on mobile devices: a survey

I Ullah, R Boreli, SS Kanhere - International Journal of Information …, 2023 - Springer
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

Privacy in targeted advertising: A survey

I Ullah, R Boreli, SS Kanhere - arXiv preprint arXiv:2009.06861, 2020 - arxiv.org
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks

Y Ma, Y Wu, J Li, J Ge - Information Sciences, 2020 - Elsevier
Balancing accountability and privacy has become extremely important in cyberspace, and
the Internet has evolved to be dominated by content transmission. Several research efforts …

An architecture for accountable anonymous access in the internet-of-things network

Y Ma, Y Wu, J Ge, LI Jun - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet, more and more devices are being connected to
the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two …

Information-theoretic security in stochastic control systems

P Venkitasubramaniam, J Yao… - Proceedings of the …, 2015 - ieeexplore.ieee.org
Infrastructural systems such as the electricity grid, healthcare, and transportation networks
today rely increasingly on the joint functioning of networked information systems and …

Quantifying the effectiveness of mobile phone virus response mechanisms

E Van Ruitenbeek, T Courtney… - 37th Annual IEEE …, 2007 - ieeexplore.ieee.org
Viruses that infect smartphones are emerging as a new front in the fight against computer
viruses. In this paper, we model the propagation of mobile phone viruses in order to study …

Attacking anonymous web browsing at local area networks through browsing dynamics

S Yu, W Zhou, W Jia, J Hu - The Computer Journal, 2012 - ieeexplore.ieee.org
The majority of current anonymous systems focus on improving anonymity at the network
and website level in order to defend against traffic analysis attacks. However, the …

Improving the efficiency of anonymous routing for MANETs

JT Chen, R Boreli, V Sivaraman - Computer Communications, 2012 - Elsevier
Anonymity of mobile devices and their data is an essential requirement to facilitate the
deployment of future Mobile Ad hoc Networks. The currently proposed anonymous routing …

Hide and code: Session anonymity in wireless line networks with coded packets

H Sousa-Pinto, DE Lucani… - 2012 Information Theory …, 2012 - ieeexplore.ieee.org
The broadcast nature of the communication channel enables a malicious eavesdropper to
gain information about connectivity and active sessions in a multi-hop wireless network. This …

Investigating the trade-off between overhead and delay for full packet traffic privacy

A Iacovazzi, A Baiocchi - 2013 IEEE International Conference …, 2013 - ieeexplore.ieee.org
It has been demonstrated that traffic analysis can disclose information supposedly secured
by encrypted channels. Key feature of packetized traffic exploited to that purpose are packet …