Browse by Subject "Privacy"

  • Juen, Joshua Paul Joseph (2015-08-18)
    Mobile devices contain sensors which allow continuous recording of a user's motion allowing the development of activity, fitness and health applications. With varied applications, the motion sensors present new privacy ...

    application/pdf

    application/pdfPDF (6MB)
  • Dosono, Bryan (iSchools, 2016-03-15)
    Marginalized communities rely on community anchor institutions like public libraries as their primary location for connecting to the Internet. Using the Onondaga County Public Library (OCPL) system in Upstate New York as ...

    application/pdf

    application/pdfPDF (589kB)
  • Pham, Nam D. (2011-01-14)
    This work is motivated by the emergence of participatory sensing applications, a new sensing paradigm that off-loads sensing responsibility from infrastructure sensors and professional sources to the crowd. This leads to ...

    application/pdf

    application/pdfPDF (1MB)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1MB)
  • Brandimarte, Laura; Acquisti, Alessandro; Loewenstein, George; Babcock, Linda (2009-02-08)
    In this paper, we run a series of experiments in order to investigate one possible cause of inconsistency in people’s behavior and concerns regarding online privacy. Even though individuals claim that privacy is very ...

    application/pdf

    application/pdfPDF (22kB)
  • Juen, Joshua (2012-09-18)
    This thesis analyzes the threat of autonomous system (AS) and Internet exchange (IX) level adversaries on Tor, currently the most widely deployed and used anonymity overlay network. Of particular interest is the possibility ...

    application/pdf

    application/pdfPDF (851kB)
  • Jahid, Sonia (2014-01-16)
    Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of ...

    application/pdf

    application/pdfPDF (1MB)
  • application/pdf

    application/pdfPDF (57kB)
  • Lamb, Karen (2015-05)
    Constantly attached to your body or clothing, wearable devices offer a plethora of new data availability for collection. However, critical emerging threats to user security and privacy accompany this new source of data. ...

    application/pdf

    application/pdfPDF (668kB)Restricted to U of Illinois