Browse by Subject "Privacy"

  • Ahmadi, Hossein (2012-02-06)
    Proliferation of mobile devices and sensors in common use is anticipated to have a key role in building a smarter planet. The future Internet will be dominated by vast amount of sensing data. This thesis attacks a grand ...

    application/pdf

    application/pdfPDF (2Mb)
  • LaPelusa, Michael B.; Mason, Sara S.; Taiym, Wafa F.; Sargsyan, Ashot; Lee, Lesley R.; Wear, Mary L.; Van Baalen, Mary (2015-05)
    Medical privacy of NASA astronauts requires an organized and comprehensive approach when data are being made available outside NASA systems. A combination of factors, including the uniquely small patient population, the ...

    application/pdf

    application/pdfPDF (1Mb)
  • Xu, Lingyu (2015-04-28)
    Many applications on Android rely on advertisements for revenue. In the current advertisement model, ad libraries are linked to host applications and their permission requirements are coupled. More permissions means more ...

    application/pdf

    application/pdfPDF (2Mb)Restricted to U of Illinois
  • Xu, Heng (2010-02-03)
    Online social networks (OSNs) brought the voluntary disclosure of personal information to the mainstream, rendering the potential intrusion of privacy a critical and acute concern. The main objective of this roundtable is ...

    application/pdf

    application/pdfPDF (31Kb)
  • Pham, Nam D. (2011-01-14)
    This work is motivated by the emergence of participatory sensing applications, a new sensing paradigm that off-loads sensing responsibility from infrastructure sensors and professional sources to the crowd. This leads to ...

    application/pdf

    application/pdfPDF (1Mb)
  • Brandimarte, Laura; Acquisti, Alessandro; Loewenstein, George; Babcock, Linda (2009-02-08)
    In this paper, we run a series of experiments in order to investigate one possible cause of inconsistency in people’s behavior and concerns regarding online privacy. Even though individuals claim that privacy is very ...

    application/pdf

    application/pdfPDF (22Kb)
  • Juen, Joshua (2012-09-18)
    This thesis analyzes the threat of autonomous system (AS) and Internet exchange (IX) level adversaries on Tor, currently the most widely deployed and used anonymity overlay network. Of particular interest is the possibility ...

    application/pdf

    application/pdfPDF (851Kb)
  • Jahid, Sonia (2014-01-16)
    Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of ...

    application/pdf

    application/pdfPDF (1Mb)
  • application/pdf

    application/pdfPDF (57Kb)