Back to Results
First PageMeta Content
Smartphones / Information appliances / Automatic identification and data capture / Android / Android Market / Mobile software / Mobile advertising / Privacy / Internet privacy / Technology / Computing / Software


1 Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics Muhammad Haris, The Hong Kong University of Science and Technology Hamed Haddadi, Queen Mary University of London and Qatar Computing Research I
Add to Reading List

Document Date: 2014-10-20 21:45:31


Open Document

File Size: 869,15 KB

Share Result on Facebook

City

User / Device / /

Company

Mobile Connectivity Technologies / Motorola / HTC / AdMob / Adidas / Samsung / Nike / Google / /

/

Event

FDA Phase / /

Facility

The Hong Kong University of Science / Queen Mary University of London / Mobile Station / library AppIntent / tower ID / /

IndustryTerm

actual device / cellular systems / ad server / mobile cloud services / multi agent systems / Internet connectivity / similar tools / static analysis tool / privacy protection solutions / mobile operating systems / particular device / internet connection / dynamic context aware applications / hybrid privacy detection tool / mobile computing / few recent tools / mobile computing paradigm / privacy detection tools / social media / free applications / trustworthy applications / inside host applications / cellular protocols / few recent advanced sensor-based applications / advertising libraries / social networking / software development kits / software platforms / required services / iris imaging / technology scene / mobile devices / wireless protocol / cellular network / wireless router / distinct applications / data mining techniques / real time analysis / naive bayes algorithm / cellular networks / voice communications / manufacturing costs / dynamic analysis tools / insights into current solutions / public zero mobile networks / search data / mobile social networking applications / connected wearable devices / connectivity technologies / large processing powers / malicious ad server / wearable technology / finger printing / privacy-monitoring tools / Internet TABLE / nearby devices / personal mobile devices / sensor technologies / malicious applications / mobile computing research / ad network / mobile technology / fitness applications / individual device / them on their devices / mobile e-commerce / short range technology / mobile communication protocols / wearable devices / cellular data networks / privacy solutions / contextaware applications / hardware technologies / /

MarketIndex

IPC / /

OperatingSystem

Linux / Android / PiOS / /

Organization

University of London / Hong Kong University of Science and Technology / International Criminal Court / /

Person

Hamed Haddadi / /

/

Position

interpreter / co-operative / /

Product

Data Flow / /

ProgrammingLanguage

Java / JavaScript / /

ProvinceOrState

Mississippi / /

Technology

wireless protocol / HTTP protocols / Linux / API / mobile phones / Operating System / shared memory / networking protocol / mobile devices / B. WiFi WiFi technology / Java / Cellular Ecosystem Protocol / wearable technology / Bluetooth / connectivity technologies / SMS / facial recognition / smart phone / GPS / MAC address / GSM system / P2P / Machine Learning / Android / mobile device / operating systems / Wi-Fi / hardware technologies / A. Cellular Technology Cellular technology / wireless router / sensor technologies / mobile communication protocols / naive bayes algorithm / WLAN / short range technology / smartphones / Mobile Computing / studies Technology / HTTP / data mining / Paging / /

URL

www.google.com/glass/start / /

SocialTag