Recent development of location technologies enables us to obtain the location history of users. This paper proposes a new method to infer users’ longterm properties from their r...
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
As the use of social networks becomes more widespread and commonplace, users are beginning to question how their privacy is protected by social networks. In this paper, we review ...
Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Ba...
Abstract. Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet prac...
Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gus...
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...