- AllJoyn: The Fast Track to the Internet of Everything. https://www.alljoyn.org/.Google Scholar
- Apple Q/A on Location Data. http://www.apple.com/pr/library/2011/04/27Apple-QA-on-Location-Data.html.Google Scholar
- Dear Fitbit Users, Kudos On the 30 Minutes of "Vigorous Sexual Activity" Last Night. http://gizmodo.com/5817784/dear-fitbitusers-kudos-on-the-30-minutes-of-vigoroussexual-activity-last-night.Google Scholar
- Facebook Changes Privacy Settings for Millions of Users - Facial Recognition is Enabled. http://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facialrecognition-enabled/.Google Scholar
- Friday. http://www.fridayed.com/.Google Scholar
- Google Glass has a 30-Minute Battery Life While Shooting Video. http://www.digitaltrends.com/mobile/googleglass-30-minute-videobattery/.Google Scholar
- Google Privacy Policies Get Major Revamp. http://www.huffingtonpost.com/2012/01/24/google-privacy-policies n 1229470.html.Google Scholar
- Haggle. http://code.google.com/p/haggle/.Google Scholar
- Precautions to Take When Using Public WiFi Service. www.att.com/esupport/article.jsp?sid=KB112237.Google Scholar
- Thousands of Amazon on S3 Data Stores Left Unsecured Due to Misconfiguration. http://www.engadget.com/2013/03/27/thousandsof-amazon-s3-data-stores-left-unsecured/.Google Scholar
- US Prosecutors Want 'Kill Switch' to Stop Smartphone Theft. http://spectrum.ieee.org/tech-talk/consumerelectronics/gadgets/us-prosecutors-wantkill-switch-stop-smartphone-theft.Google Scholar
- User Backlash Forces Facebook Privacy Tweaks, Again. http://www.fastcompany.com/1484919/user-backlash-forcesfacebook-privacy-tweaks-again.Google Scholar
- What They Know - Mobile. http://blogs.wsj.com/wtk-mobile/.Google Scholar
- ACLU. Cell Phone Company Data Rentention Chart. http://www.aclu.org/cell-phone-locationtracking-request-response-cell-phone-companydata-retention-chart.Google Scholar
- P. Aditya, et al. EnCore: Private, Contextbased Communication for Mobile Social Apps. In MobiSys, 2014. Google ScholarDigital Library
- ARM. ARM Security Technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C trustzone security whitepaper.pdf, 2009.Google Scholar
- V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In MOBICOM, 2008. Google ScholarDigital Library
- J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. In Advances in Cryptology - CRYPTO 2004, 2004.Google ScholarCross Ref
- A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In CCS, 2011. Google ScholarDigital Library
- V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In Proceedings of the 3rd USENIX Virtual Machine Research And Technology Symposium, 2004. Google ScholarDigital Library
- J. A. Halderman, et al. Lest we Remember: Cold-boot Attacks on Encryption Keys. Communications of the ACM, 52(5):91--98, 2009. Google ScholarDigital Library
- Intel Corp. Software Guard Extension Programming Reference. http://software.intel.com/sites/default/files/329298-001.pdf, 2012.Google Scholar
- M. Lentz, et al. SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security, 2014. Google ScholarDigital Library
Index Terms
- Brave New World: Privacy Risks for Mobile Users
Comments