Sciweavers

236 search results - page 9 / 48
» Analyzing Privacy Designs of Mobile Social Networking Applic...
Sort
View
CCS
2010
ACM
14 years 8 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
PERVASIVE
2010
Springer
14 years 11 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
103
Voted
SIGCOMM
2009
ACM
15 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
BCSHCI
2008
14 years 11 months ago
Representing location in location-based social awareness systems
We analyze the results of a survey distributed to heavy users of social networking website on current mobile communications practices regarding location disclosure. We discovered ...
Michael Voong, Russell Beale
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 4 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov