Proximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive geo-localisation and used to build a sense of serendipitous discovery of people, places and interests. Unfortunately, while this class of applications opens different interactions possibilities for people in urban settings, obtaining access to certain identity information could lead a possible privacy attacker to identify and follow a user in their movements in a specific period of time. The same information shared through the platform could also help an attacker to link the victim’s online profiles to physical identities. We a...
Geosocial networks, social networks integrating their users' location, meet an undeniable success. W...
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their ...
Abstract. In this paper, we introduce a navigation privacy attack, where an external adversary attem...
Proximity-based social applications let users interact with people that are currently close to them,...
Abstract. Millions of people around the globe try to find their other half using Information and Com...
Every day we publish an impressive amount of information about ourselves online: Pictures, videos, t...
Part 4: Privacy IInternational audienceRecently, a wide range of dating applications has emerged for...
Mobile devices with positioning capabilities allow users to participate in novel and exciting locati...
21st Australasian Conference on Information Security and Privacy : ACISP 2016, Melbourne, VIC, Austr...
Dating apps for mobile devices, one popular GeoSocial app category, are growing increasingly popular...
Future social networks will rely heavily on sensing data collected from users’ mobile and wearable d...
Location proximity schemes have been adopted by social networks and other smartphone apps as a means...
Mobile devices with positioning capabilities allow users to participate in novel and exciting locati...
The rapid advance in handheld communication devices and the appearance of smartphones has allowed us...
Proximity-based apps have been changing the way people interact with each other in the physical worl...
Geosocial networks, social networks integrating their users' location, meet an undeniable success. W...
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their ...
Abstract. In this paper, we introduce a navigation privacy attack, where an external adversary attem...
Proximity-based social applications let users interact with people that are currently close to them,...
Abstract. Millions of people around the globe try to find their other half using Information and Com...
Every day we publish an impressive amount of information about ourselves online: Pictures, videos, t...
Part 4: Privacy IInternational audienceRecently, a wide range of dating applications has emerged for...
Mobile devices with positioning capabilities allow users to participate in novel and exciting locati...
21st Australasian Conference on Information Security and Privacy : ACISP 2016, Melbourne, VIC, Austr...
Dating apps for mobile devices, one popular GeoSocial app category, are growing increasingly popular...
Future social networks will rely heavily on sensing data collected from users’ mobile and wearable d...
Location proximity schemes have been adopted by social networks and other smartphone apps as a means...
Mobile devices with positioning capabilities allow users to participate in novel and exciting locati...
The rapid advance in handheld communication devices and the appearance of smartphones has allowed us...
Proximity-based apps have been changing the way people interact with each other in the physical worl...
Geosocial networks, social networks integrating their users' location, meet an undeniable success. W...
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their ...
Abstract. In this paper, we introduce a navigation privacy attack, where an external adversary attem...