A Run a Day Won't Keep the Hacker Away

Author:

Dhondt Karel1,Le Pochat Victor2,Voulimeneas Alexios1,Joosen Wouter2,Volckaert Stijn1

Affiliation:

1. imec-DistriNet, KU Leuven, Ghent, Belgium

2. imec-DistriNet, KU Leuven, Leuven, Belgium

Funder

Flemish Research Programme Cybersecurity

Fonds Wetenschappelijk Onderzoek

Research Fund KU Leuven

Publisher

ACM

Reference58 articles.

1. Adidas. 2021 . adidas Runtastic: adidas Running & adidas Training apps . Retrieved Sept. 21, 2021 from https://www.runtastic.com/. Adidas. 2021. adidas Runtastic: adidas Running & adidas Training apps. Retrieved Sept. 21, 2021 from https://www.runtastic.com/.

2. Abdulmajeed Alqhatani and Heather Richter Lipford . 2019 . " There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data . In 15th Symposium on Usable Privacy and Security (SOUPS '19) , 421--434. Abdulmajeed Alqhatani and Heather Richter Lipford. 2019. "There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data. In 15th Symposium on Usable Privacy and Security (SOUPS '19), 421--434.

3. Geo-indistinguishability

4. Carmen Ang . 2020 . The Growth of Home Fitness Apps . Visual Capitalist. (Sept. 10 , 2020). https://www.visualcapitalist.com/the-growth-of-home-fitness-apps-2020/. Carmen Ang. 2020. The Growth of Home Fitness Apps. Visual Capitalist. (Sept. 10, 2020). https://www.visualcapitalist.com/the-growth-of-home-fitness-apps-2020/.

5. C. A. Ardagna , M. Cremonini , E. Damiani , S. De Capitani di Vimercati, and P. Samarati. 2007 . Location Privacy Protection Through Obfuscation-Based Techniques. In IFIP Annual Conference on Data and Applications Security and Privacy, 47--60 . doi: 10.1007/978-3-540-73538-0_4. 10.1007/978-3-540-73538-0_4 C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati. 2007. Location Privacy Protection Through Obfuscation-Based Techniques. In IFIP Annual Conference on Data and Applications Security and Privacy, 47--60. doi: 10.1007/978-3-540-73538-0_4.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy;Proceedings of the ACM on Human-Computer Interaction;2024-04-17

2. Overview of Usable Privacy Research: Major Themes and Research Directions;Synthesis Lectures on Information Security, Privacy, and Trust;2024

3. The Lawfulness of Re-identification Under Data Protection Law;Lecture Notes in Computer Science;2024

4. Masking Location Streams in the Presence of Colluding Service Providers;2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2023-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3