Showing 1 - 20 results of 30 for search '"privacy"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Security and privacy in app ecosystems by Taylor, V

    Published 2017
    “…While smartphone apps have undoubtedly provided immeasurable benefit to users, they also contribute their fair share of drawbacks, such as increases in security risks and the erosion of user privacy. In this thesis, I focus on the Android smartphone operating system, and pave the way for improving the security and privacy of its app ecosystem.…”
    Thesis
  3. 3
  4. 4

    Security and privacy in speaker recognition systems by Turner, H

    Published 2021
    “…</p> <p>In this thesis we examine the security and privacy aspects of these systems, with a particular focus on remotely accessed speaker recognition. …”
    Thesis
  5. 5

    Continuous touchscreen biometrics: authentication and privacy concerns by Georgiev, MK

    Published 2022
    “…In particular, we look into any threats that can affect the privacy of the user, such as tracking them and revealing their personal information based on their behaviour on smartphones.…”
    Thesis
  6. 6

    Security and privacy in location-aware mobile systems by Vaas, C

    Published 2018
    “…While the advantages of location-aware mobile systems to improve security are undisputed, methods to ensure the reliability of location information and minimise the impact on user privacy still require further research.</p> <p>In this dissertation, we aim to extend the knowledge about security and privacy implications of location information. …”
    Thesis
  7. 7

    There are many apps for that: Quantifying the availability of privacy-preserving apps by Taylor, V, Beresford, A, Martinovic, I

    Published 2017
    “…When searching for these apps, users are often presented with a vast array of choices, but no distinction is made in the user interface to highlight the relative privacy risks inherent in choosing one app over an- other. …”
    Conference item
  8. 8

    Security and Privacy Impacts of a Unique Personal Identifier by Martin, A, Martinovic, I

    Published 2016
    “…From a technical systems perspective, we review the objectives of such schemes, along with the resulting requirements, particularly the strong need to ensure appropriate levels of privacy and security. These objectives and requirements are addressed within the context of the broad range of threats against the system. …”
    Working paper
  9. 9

    Measuring operational realities of security and privacy for deployed avionics by Smith, M

    Published 2018
    “…Privacy in the near-term is somewhat harder, but steps towards it in the longer term are underway.…”
    Thesis
  10. 10

    Undermining privacy in the aircraft communications addressing and reporting system (ACARS) by Smith, M, Moser, D, Strohmeier, M, Lenders, V, Martinovic, I

    Published 2018
    “…In this paper, we present an analysis of ACARS usage by privacy sensitive actors-military, government and business. …”
    Conference item
  11. 11

    Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones by Birnbach, S, Baker, R, Martinovic, I

    Published 2017
    “…But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. …”
    Conference item
  12. 12
  13. 13

    #PrettyFlyForAWiFi: real-world detection of privacy invasion attacks by drones by Birnbach, S, Baker, R, Eberz, S, Martinovic, I

    Published 2021
    “…But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. …”
    Journal article
  14. 14

    Economy class crypto: Exploring weak cipher usage in avionic communications via ACARS by Smith, M, Moser, D, Strohmeier, M, Lenders, V, Martinovic, I

    Published 2017
    “…Our results show that the decrypted data leaks privacy sensitive information including existence, intent and status of aircraft owners.…”
    Conference item
  15. 15

    To update or not to update: Insights From a two-year study of Android app evolution by Taylor, V, Martinovic, I

    Published 2017
    “…Although there are over 1,900,000 third-party Android apps in the Google Play Store, little is understood about how their security and privacy characteristics, such as dangerous permission usage and the vulnerabilities they contain, have evolved over time. …”
    Conference item
  16. 16

    Fingerprinting and personal information leakage from touchscreen interactions by Georgiev, M, Eberz, S, Martinovic, I

    Published 2022
    “…The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. …”
    Conference item
  17. 17

    The real first class? Inferring confidential corporate mergers and government relations from air traffic communication by Strohmeier, M, Smith, M, Lenders, V, Martinovic, I

    Published 2018
    “…This paper exploits publicly available aircraft meta data in conjunction with unfiltered air traffic communication gathered from a global collaborative sensor network to study the privacy impact of large-scale aircraft tracking on governments and public corporations. …”
    Conference item
  18. 18

    Securing new space: on satellite cyber-security by Pavur, J

    Published 2021
    “…</p> <p>Our method is developed through in-depth analysis of the security and privacy properties of modern satellite broadband services. …”
    Thesis
  19. 19

    Security in next generation air traffic communication networks by Strohmeier, M

    Published 2016
    “…</p> <p>Finally, we analyse the privacy consequences of open air traffic control protocols. …”
    Thesis
  20. 20

    Biometric Identification System based on Object Interactions in Internet of Things Environments by Krawiecka, K, Birnbach, S, Eberz, S, Martinovic, I

    Published 2022
    “…If you intend to use this dataset, please cite: @inproceedings{bisiot2022, title={Biometric Identification System based on Object Interactions in Internet of Things Environments}, author={Krawiecka, Klaudia and Birnbach, Simon and Eberz, Simon, and Martinovic, Ivan}, booktitle={2022 IEEE Security and Privacy Workshops (SPW)}, year={2022}, organization={IEEE} }…”
    Dataset