Filters








5 Hits in 5.1 sec

Can You Pay for Privacy? Consumer Expectations and the Behavior of Free and Paid Apps

Bamberger, Kenneth A.; Egelman, Serge; Han, Catherine; Bar On, Amit Elazari; Reyes, Irwin
2020
We complement this data with a second study: we surveyed 1,000 Android mobile app users as to their perceptions of the privacy behaviors of paid and free app versions.  ...  We first present an empirical study that documents and compares the privacy behaviors of 5,877 Android apps that are offered both as free and paid versions.  ...  Declared Android Permissions The Android permission system serves to protect user privacy.  ... 
doi:10.15779/z38xp6v40j fatcat:nwe7ok4qwrd67fgjzgosfb4vdy

Designing Effective Security and Privacy Schemes for Wireless Mobile Devices [article]

(:Unkn) Unknown, University, My, Xiaojiang Du
2020
In this dissertation, we first present the security and privacy vulnerabilities we discovered.  ...  The key idea is to check the consistency between the claimed identity and the actual identity of a webpage/app.  ...  However, mobile malwares and privacy leakage remain a big threat for mobile phone security and privacy.  ... 
doi:10.34944/dspace/3832 fatcat:kghp4wqesbhvjktw4n6ry3jede

Practical Private Set Intersection Protocols for Privacy-Preserving Applications

Christian Weinert
2021
As we show that such hashing-based protocols are vulnerable to brute-force attacks, the users' entire social graphs are exposed to anyone with access to the service providers' infrastructure.  ...  As a consequence, service providers currently deploy insecure alternatives that threaten users' privacy at a large scale.  ...  We thank Oleksandr Tkachenko for his invaluable help with the implementation and benchmarking. We also thank Moni Naor for suggesting the application to achieve differential privacy.  ... 
doi:10.26083/tuprints-00019295 fatcat:mcrri3mvh5a3jois3hzpolx3ae

From Visual Identity to Political Act: The History of Kirin's Illustrations for Tales of Long Ago
Od vizualnoga identiteta do političkoga čina: povijest Kirinovih ilustracija Priča iz davnine

Sanja Lovrić Kralj, Tea Dvoršćak
2018 Libri et Liberi  
For example, in some narrative apps, there are no hidden signs in a scene, but the presented signs can be moved around by the interpreter.  ...  Knowledge and experience are dismissed and reconfigured as mere competences precisely through the introduction of computer technology, which helps to obscure the real extent of work experience and the  ... 
doi:10.21066/carcl.libri.2018-07(01).0004 fatcat:r2jdecwq3jf4jkixsxsinfvzru

ICONS 2016 Committee ICONS 2016 Advisory Committee EMBEDDED 2016 EMBEDDED 2016 Advisory Committee EMBEDDED 2016 Technical Program Committee

Taiwan Technology, Chung
unpublished
This is somehow obscured by the difficulty of applying formal techniques (usually used for equipment-related safety requirements) to derivation and satisfaction of human-related safety requirements (usually  ...  All modules are programmed in the Java programming language suitable to be applied into an app for the Android platform.  ...  A PDP is defined as permissive or restrictive depending on whether it sends an "allow" or "deny".  ... 
fatcat:n3t6ztbuhfdynk676ouohxs7ue