How talkative is your mobile device?: an experimental study of Wi-Fi probe requests | 35 | 1.59 | 2015 |
Controlled Data Sharing for Collaborative Predictive Blacklisting. | 9 | 0.53 | 2015 |
Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing | 2 | 0.38 | 2014 |
Privacy-Friendly Collaboration for Cyber Threat Mitigation. | 0 | 0.34 | 2014 |
Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication. | 1 | 0.63 | 2013 |
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks | 2 | 0.38 | 2013 |
Non-Cooperative Location Privacy | 22 | 0.70 | 2013 |
Evaluating the privacy risk of location-based services | 51 | 1.93 | 2011 |
Privacy-triggered communications in pervasive social networks | 2 | 0.44 | 2011 |
The Inconvenient Truth about Web Certificates. | 30 | 2.47 | 2011 |
Integrity of the web content: the case of online advertising | 13 | 0.84 | 2010 |
SensorTune: a mobile auditory interface for DIY wireless sensor networks | 5 | 0.52 | 2010 |
Tracking games in mobile networks | 15 | 0.94 | 2010 |
Unraveling an old cloak: k-anonymity for location privacy | 59 | 2.05 | 2010 |
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. | 7 | 0.51 | 2009 |
On non-cooperative location privacy: a game-theoretic analysis | 74 | 2.86 | 2009 |
On the Optimal Placement of Mix Zones | 71 | 2.58 | 2009 |
A distortion-based metric for location privacy | 44 | 1.78 | 2009 |
On Wireless Social Community Networks | 23 | 2.03 | 2008 |