Opportunistic networking involves forwarding messages between proximate users, who may or may not know one another. This assumes that users are willing to forward messages to each other. This assumption may not hold if users are concerned about using the opportunistic network service. One such concern may be due to privacy; for instance, users' locations may be leaked. A privacy-concerned user may therefore disable their mobile device's opportunistic-networking features at various times, to preserve their privacy. This paper studies the impact of location privacy concerns on the performance of an opportunistic network. Using data from a real-world location-aware user study to develop a privacy model, we conduct trace-based simulations of va...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
The rapid advance in handheld communication devices and the appearance of smartphones has allowed us...
Abstract: Location privacy in Mobile Social Networks (MSNs) has generated significant interest in re...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
In recent years, networked devices spread into different activities in our daily lives enabling many...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to prote...
In modern mobile networks, users increasingly share their location with third-parties in return for ...
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to prote...
Future wearable devices are expected to increasingly exchange their positioning information with var...
Abstract—The proliferation of smartphones and handheld mo-bile devices spurs a variety of personaliz...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Location-sharing services have grown in use commensurately with the increasing popularity of smart p...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Abstract: Context-aware computing often involves tracking peoples ’ location. Many studies and appli...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
The rapid advance in handheld communication devices and the appearance of smartphones has allowed us...
Abstract: Location privacy in Mobile Social Networks (MSNs) has generated significant interest in re...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
In recent years, networked devices spread into different activities in our daily lives enabling many...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to prote...
In modern mobile networks, users increasingly share their location with third-parties in return for ...
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to prote...
Future wearable devices are expected to increasingly exchange their positioning information with var...
Abstract—The proliferation of smartphones and handheld mo-bile devices spurs a variety of personaliz...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Location-sharing services have grown in use commensurately with the increasing popularity of smart p...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Abstract: Context-aware computing often involves tracking peoples ’ location. Many studies and appli...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
The rapid advance in handheld communication devices and the appearance of smartphones has allowed us...
Abstract: Location privacy in Mobile Social Networks (MSNs) has generated significant interest in re...