[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2500423.2504577acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
poster

Toward preserving privacy and functionality in geosocial networks

Published: 30 September 2013 Publication History
First page of PDF

References

[1]
Yelp. http://www.yelp.com.
[2]
Foursquare. https://foursquare.com/.
[3]
Balachander Krishnamurthy and Craig E. Wills. On the leakage of personally identifiable information via online social networks. Computer Communication Review, 40(1):112--117, 2010.
[4]
Emily Steel and Geoffrey Fowler. Facebook in privacy breach. http://online.wsj.com/article/SB100014240527023047728045755584840752369%68.html.
[5]
M. Humbert, T. Studer, M. Grossglauser, and J-P Hubaux. Nowhere to Hide: Navigating around Privacy in Online Social Networks. In The Proceedings of 18th ESORICS, 2013.
[6]
B. Carbunar and R. Potharaju. You unlocked the Mt. Everest Badge on Foursquare! Countering Location Fraud in GeoSocial Networks. In Proceedings of the 9th IEEE MASS'12, 2012.
[7]
Josh Benaloh. Dense probabilistic encryption. In Proceedings of the Workshop on Selected Areas of Cryptography, pages 120--128, 1994.
[8]
Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, 1979.
[9]
Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys, 2003.
[10]
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, and Urs Hengartner. Achieving Efficient Query Privacy for Location Based Services. In Privacy Enhancing Technologies, pages 93--110, 2010.
[11]
P. Golle, F. McSherry, and I. Mironov. Data collection with self-enforcing privacy. In ACM CCS 2006, pages 69--78. ACM.
[12]
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In NDSS, 2010.

Cited By

View all
  • (2018)A Novel Differential Privacy Recommendation Method Based on a Distributed Framework2018 IEEE International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW.2018.00189(1332-1339)Online publication date: Nov-2018
  • (2017)Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in AndroidHuman Aspects of Information Security, Privacy and Trust10.1007/978-3-319-58460-7_48(703-721)Online publication date: 13-May-2017
  • (2016)X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications2016 Third International Conference on Trustworthy Systems and their Applications (TSA)10.1109/TSA.2016.13(17-22)Online publication date: Sep-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
September 2013
504 pages
ISBN:9781450319997
DOI:10.1145/2500423
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2013

Check for updates

Author Tags

  1. location verification
  2. privacy
  3. social networks

Qualifiers

  • Poster

Conference

MobiCom'13
Sponsor:

Acceptance Rates

MobiCom '13 Paper Acceptance Rate 28 of 207 submissions, 14%;
Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)A Novel Differential Privacy Recommendation Method Based on a Distributed Framework2018 IEEE International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW.2018.00189(1332-1339)Online publication date: Nov-2018
  • (2017)Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in AndroidHuman Aspects of Information Security, Privacy and Trust10.1007/978-3-319-58460-7_48(703-721)Online publication date: 13-May-2017
  • (2016)X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications2016 Third International Conference on Trustworthy Systems and their Applications (TSA)10.1109/TSA.2016.13(17-22)Online publication date: Sep-2016
  • (2014)Historical Trajectories Based Location Privacy Protection QueryProceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)10.1109/UIC-ATC-ScalCom.2014.118(228-235)Online publication date: 9-Dec-2014
  • (2014)${\rm PROFIL}_{R}$IEEE Transactions on Information Forensics and Security10.1109/TIFS.2014.23076979:4(709-718)Online publication date: 1-Apr-2014
  • (undefined)Conflicting Administrative and Critical Paradigms in Data Tracking Policy: A Lazarsfeldian AnalysisSSRN Electronic Journal10.2139/ssrn.2732267

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media