Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Igor Bilogrevic"'
Autor:
Mathias Humbert, Kévin Huguenin, Alexandre Meylan, Bertil Chapuis, Mauro Cherubini, Igor Bilogrevic
Publikováno v:
ACM Transactions on Privacy and Security
ACM Transactions on Privacy and Security, ACM, 2020, 24 (1), pp.4:1-4:36. ⟨10.1145/3410154⟩
ACM Transactions on Privacy and Security, vol. 4, no. 1, pp. 4:1-4:36
ACM Transactions on Privacy and Security, ACM, 2020, 24 (1), pp.4:1-4:36. ⟨10.1145/3410154⟩
ACM Transactions on Privacy and Security, vol. 4, no. 1, pp. 4:1-4:36
App stores provide access to millions of different programs that users can download on their computers. Developers can also make their programs available for download on their websites and host the program files either directly on their website or on
Autor:
Martin Pelikan, Pauline Anthonysamy, Nina Taft, Úlfar Erlingsson, Igor Bilogrevic, Sai Teja Peddinti, Giles Hogben
Publikováno v:
Internet Measurement Conference
Users of mobile apps sometimes express discomfort or concerns with what they see as unnecessary or intrusive permission requests by certain apps. However encouraging mobile app developers to request fewer permissions is challenging because there are
Autor:
Kévin Huguenin, Mauro Cherubini, Igor Bilogrevic, Alexandre Meylan, Mathias Humbert, Bertil Chapuis
Publikováno v:
Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS), pp. 1256-1271
CCS
CCS
Internet users can download software for their computers from app stores (e.g., Mac App Store and Windows Store) or from other sources, such as the developers' websites. Most Internet users in the US rely on the latter, according to our representativ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5a7a7a9c6e20f6b1f7bf9eef6a23a55d
https://serval.unil.ch/notice/serval:BIB_9BD511E5C0D0
https://serval.unil.ch/notice/serval:BIB_9BD511E5C0D0
Autor:
Igor Bilogrevic
Publikováno v:
Handbook of Mobile Data Privacy ISBN: 9783319981604
Handbook of Mobile Data Privacy
Handbook of Mobile Data Privacy
The use of location data has greatly benefited from the availability of location-based services, the popularity of social networks, and the accessibility of public location data sets. However, in addition to providing users with the ability to obtain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7d14a28bf21c8a63f25d98d2baa2c772
https://doi.org/10.1007/978-3-319-98161-1_8
https://doi.org/10.1007/978-3-319-98161-1_8
Autor:
Igor Bilogrevic, Kévin Huguenin
Publikováno v:
HAL
Methods and apparatuses are provided for automatically optimizing application program code for minimized access to privacy data. A privacy-oriented code optimizing module process and/or facilitate a processing one or more code segments, one or more e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::946c51c833d928f81cb20315e14c12a0
https://hal.science/hal-01366301
https://hal.science/hal-01366301
Publikováno v:
Journal of Computer Security. 21:317-346
Location privacy is a major concern in pervasive networks where static device identifiers enable malicious eavesdroppers to continuously track users and their movements. In order to prevent such identifier-based tracking, devices could coordinate reg
Publikováno v:
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing, Institute of Electrical and Electronics Engineers, 2016, 15 (8), pp.2109-2123. ⟨10.1109/TMC.2015.2483498⟩
IEEE Transactions on Mobile Computing, 2016, 15 (8), pp.2109-2123. ⟨10.1109/TMC.2015.2483498⟩
IEEE Transactions on Mobile Computing, Institute of Electrical and Electronics Engineers, 2016, 15 (8), pp.2109-2123. ⟨10.1109/TMC.2015.2483498⟩
IEEE Transactions on Mobile Computing, 2016, 15 (8), pp.2109-2123. ⟨10.1109/TMC.2015.2483498⟩
International audience; Activity-tracking applications, where people record and upload information about their location-based activities (e.g., the routes of their activities), are increasingly popular. Such applications enable users to share informa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::342eee92e65251e3e19dcbffe703d088
https://hal.archives-ouvertes.fr/hal-01198596
https://hal.archives-ouvertes.fr/hal-01198596
Autor:
Martin Ortlieb, Igor Bilogrevic
Publikováno v:
CHI
Online services often rely on processing users' data, which can be either provided directly by the users or combined from other services. Although users are aware of the latter, it is unclear whether they are comfortable with such data combination, w
Publikováno v:
Computer Networks. 55:1168-1180
Public-key certificates allow a multitude of entities to securely exchange and verify the authenticity of data. However, the ability to effectively revoke compromised or untrustworthy certificates is of great importance when coping with misbehavior.
Publikováno v:
22nd Network and Distributed System Security Symposium (NDSS)
22nd Network and Distributed System Security Symposium (NDSS), Feb 2015, San Diego, CA, United States. ⟨10.14722/ndss.2015.23032⟩
NDSS
22nd Network and Distributed System Security Symposium (NDSS), Feb 2015, San Diego, CA, United States. ⟨10.14722/ndss.2015.23032⟩
NDSS
International audience; Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., “restaurant”). Such data might reveal some personal information about users beyond what they actual
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0811d6c7973b07b2900ac588bda276fa
https://hal.archives-ouvertes.fr/hal-01076554/document
https://hal.archives-ouvertes.fr/hal-01076554/document