The perfect storm: The privacy paradox and the Internet-of-Things

M Williams, JRC Nurse, S Creese - 2016 11th International …, 2016 - ieeexplore.ieee.org
Privacy is a concept found throughout human history and opinion polls suggest that the
public value this principle. However, while many individuals claim to care about privacy, they …

Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks

A Aktypi, JRC Nurse, M Goldsmith - … of the 2017 on Multimedia Privacy …, 2017 - dl.acm.org
The recent expansion of Internet of Things (IoT) and the grow-ing trends towards a healthier
lifestyle, have been followed by a proliferation in the use of tness-trackers in our daily life …

Identifying key-players in online activist groups on the Facebook social network

M Nouh, JRC Nurse - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Online social media applications have become an integral part of our everyday life. Not only
are they being utilised by individuals and legitimate businesses, but also recently several …

Fully homomorphic encryption: Cryptography's holy grail

DJ Wu - XRDS: Crossroads, The ACM Magazine for Students, 2015 - dl.acm.org
For more than 30 years, cryptographers have embarked on a quest to construct an
encryption scheme that would enable arbitrary computation on encrypted data. Conceptually …

[HTML][HTML] Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem

JRC Nurse, O Buckley - Human-centric Computing and Information …, 2017 - Springer
The ubiquitous nature of the Internet provides an ideal platform for human communication,
trade, information sharing and learning. Websites play a central role in these activities as …

[HTML][HTML] Ev-linker: mapping eavesdropped wi-fi packets to individuals via electronic and visual signal matching

S Du, J Hua, Y Gao, S Zhong - Journal of Computer and System Sciences, 2016 - Elsevier
Due to the broadcast nature of Wi-Fi, attackers can easily steal users' privacy by
eavesdropping. Such attacks are in full force when packets captured can be quickly mapped …

Exploring the risks to identity security and privacy in cyberspace

JRC Nurse - XRDS: Crossroads, The ACM Magazine for Students, 2015 - dl.acm.org
Exploring the Risks to Identity Security and Privacy in Cyberspace Page 1 XRDS • SPRING
2015 • VOL.21 • NO.3 42 feature Im a g eb y M a x U s e r / S h u tte rs to c k .c o m Exploring …

A Large-scale Disease Outbreak Analytics System based on Wi-Fi Session Logs

GA Zagatti, T Wu, SK Ng… - 2021 22nd IEEE …, 2021 - ieeexplore.ieee.org
Unraveling human mobility patterns is critical for understanding disease spread and
implementing effective controls during large-scale disease outbreaks such as the COVID-19 …

Evaluation of security flaws in the current probe request design and proposed solutions

E McKinion, A Lin - … Conference on Cyber Warfare and Security, 2017 - search.proquest.com
The importance of wireless security grows with the increasing prevalence of wireless
devices. The current 802.11 wireless standard is vulnerable to eavesdropping when the …

[图书][B] Digital Image Source Authentication

DA Schippers - 2018 - search.proquest.com
The purpose of this quantitative correlational study was to determine if a unique signature
exists for EXIF JPEG elements from an iPhone 7 iOS 11 for source device and native picture …