Optimizing Patient Surgical Management Using WhatsApp Application in the Italian Healthcare System

B Nardo, M Cannistrà, V Diaco, A Naso… - Telemedicine and e …, 2016 - liebertpub.com
Introduction: Smartphones changed the method by which doctors communicate with each
other, offer modern functionalities sensitive to the context of use, and can represent a …

All the numbers are US: large-scale abuse of contact discovery in mobile messengers

C Hagen, C Weinert, C Sendner, A Dmitrienko… - Cryptology ePrint …, 2020 - eprint.iacr.org
Contact discovery allows users of mobile messengers to conveniently connect with people
in their address book. In this work, we demonstrate that severe privacy issues exist in …

Multi-dimensional attributes and measures for dynamical user profiling in social networking environments

X Zhou, W Wang, Q Jin - Multimedia Tools and Applications, 2015 - Springer
In this study, we concentrate on analyzing and building the dynamical user profiling to
describe users' multi-dimensional features and properties, in order to assist the …

Contact discovery in mobile messengers: Low-cost attacks, quantitative analyses, and efficient mitigations

C Hagen, C Weinert, C Sendner, A Dmitrienko… - ACM Transactions on …, 2022 - dl.acm.org
Contact discovery allows users of mobile messengers to conveniently connect with people
in their address book. In this work, we demonstrate that severe privacy issues exist in …

A systematic study of android non-sdk (hidden) service api security

Y He, Y Gu, P Su, K Sun, Y Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Android allows apps to communicate with its system services via system service helpers so
that these apps can use various functions provided by the system services. Meanwhile, the …

[图书][B] A linear-processor polylog-time algorithm for shortest paths in planar graphs

PN Klein, S Subramanian - 1993 - ieeexplore.ieee.org
We give an algorithm requiring polylog time and a linear number of processors to solve
single-source shortest paths in directed planar graphs, bounded-genus graphs, and 2 …

Over-the-top bypass: Study of a recent telephony fraud

M Sahin, A Francillon - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
In this paper, we study the Over-The-Top (OTT) bypass fraud, a recent form of interconnect
telecom fraud. In OTT bypass, a normal phone call is diverted over IP to a voice chat …

Privacy and data protection in smartphone messengers

C Rottermanner, P Kieseberg, M Huber… - Proceedings of the 17th …, 2015 - dl.acm.org
Ever since the Snowden revelations regarding mass surveillance, the role of privacy
protection in commodity communication software has gained increasing awareness in the …

Exploiting phone numbers and cross-application features in targeted mobile attacks

S Gupta, P Gupta, M Ahamad… - Proceedings of the 6th …, 2016 - dl.acm.org
Smartphones have fueled a shift in the way we communicate with each other via Instant
Messaging. With the convergence of Internet and telephony, new Over-The-Top (OTT) …

Call me maybe: Understanding nature and risks of sharing mobile numbers on online social networks

P Jain, P Jain, P Kumaraguru - Proceedings of the first ACM conference …, 2013 - dl.acm.org
Little research explores the activity of sharing mobile numbers on OSNs, in particular via
public posts. In this work, we understand the characteristics and risks of mobile numbers …