Papers with keyword 'privacy'
That is, papers related to Privacy
[Also available in BibTeX]
[See also: all keywords]
These papers relate to privacy in the context of computing.
Papers are listed in reverse-chronological order.
Follow updates with RSS.
- 2024:
-
Timothy J. Pierson, Cesar Arguello, Beatrice Perez, Wondimu Zegeye, Kevin Kornegay, Carl Gunter, and David Kotz.
We need a “building inspector for IoT” when smart homes are sold.
IEEE Security & Privacy, volume 22, number 6, pages 75–84.
IEEE, Nov-Dec. 2024.
doi:10.1109/MSEC.2024.3386467.
[Details]
-
Chixiang Wang, Weijia He, Timothy Pierson, and David Kotz.
Moat: Adaptive Inside/Outside Detection System for Smart Homes.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), volume 8, number 4, article 157, 31 pages.
ACM, September 2024.
doi:10.1145/3699751.
[Details]
-
Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, and David Kotz.
Contextualizing Interpersonal Data Sharing in Smart Homes.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS), volume 2024, number 2, pages 295–312.
July 2024.
doi:10.56553/popets-2024-0051.
[Details]
-
Ravindra Mangar, Timothy J. Pierson, and David Kotz.
A framework for evaluating the security and privacy of smart-home devices, and its application to common platforms.
IEEE Pervasive Computing, volume 23, number 3, pages 7–19.
IEEE, July 2024.
doi:10.1109/MPRV.2024.3421668.
[Details]
-
Cesar Arguello, Beatrice Perez, Timothy J. Pierson, and David Kotz.
Detecting Battery Cells with Harmonic Radar.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pages 231–236.
ACM, May 2024.
doi:10.1145/3643833.3656137.
[Details]
-
Mounib Khanafer, Logan Kostick, Chixiang Wang, Wondimu Zegeye, Weijia He, Berkay Kaplan, Nurzaman Ahmed, Kevin Kornegay, David Kotz, and Timothy Pierson.
Device Discovery in the Smart Home Environment.
Proceedings of the IEEE/ACM Workshop on the Internet of Safe Things (SafeThings), pages 298–304.
IEEE, May 2024.
doi:10.1109/SPW63631.2024.10705647.
[Details]
- 2023:
- 2022:
-
Spangler, Hillary B., Driesse, Tiffany M., Lynch, David H., Liang, Xiaohui, Roth, Robert M., Kotz, David, Fortuna, Karen, and Batsis, John A.
Privacy Concerns of Older Adults Using Voice Assistant Systems.
Journal of the American Geriatrics Society, volume 70, number 12, pages 3643–3647.
Wiley, August 26, 2022.
doi:10.1111/jgs.18009.
[Details]
-
Taylor Hardin and David Kotz.
Amanuensis: provenance, privacy, and permission in TEE-enabled blockchain data systems.
Proceedings of the IEEE International Conference on Distributed Computing Systems, pages 144–156.
IEEE, July 2022.
doi:10.1109/ICDCS54860.2022.00023.
[Details]
-
Adam Vandenbussche.
TorSH: Obfuscating consumer Internet-of-Things traffic with a collaborative smart-home router network.
June 2022.
Undergraduate Thesis.
[Details]
-
Taylor Hardin.
Information Provenance for Mobile Health Data.
PhD thesis, Dartmouth Computer Science, Hanover, NH, May 2022.
[Details]
-
Namya Malik.
SPLICEcube Architecture: An Extensible Wi-Fi Monitoring Architecture for Smart-Home Networks.
Master's thesis, Dartmouth Computer Science, Hanover, NH, May 2022.
[Details]
- 2021:
-
Sougata Sen and David Kotz.
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys.
Journal of Pervasive and Mobile Computing, volume 78, article 101505, 16 pages.
Elsevier, December 2021.
doi:10.1016/j.pmcj.2021.101505.
[Details]
-
Eduardo Antonio Mañas-Martínez, Elena Cabrera, Katarzyna Wasielewska, David Kotz, and José Camacho.
Mining social interactions in connection traces of a campus Wi-Fi network.
Proceedings of the SIGCOMM Poster and Demo Sessions, 3 pages, pages 6–8.
ACM, August 2021.
doi:10.1145/3472716.3472844.
[Details]
-
Paul Gralla.
An inside vs. outside classification system for Wi-Fi IoT devices.
June 2021.
Undergraduate Thesis.
[Details]
-
Taylor Hardin and David Kotz.
Amanuensis: Information Provenance for Health-Data Systems.
Journal of Information Systems Management and Security, volume 58, number 2, article 102460, 21 pages.
Elsevier, March 2021.
doi:10.1016/j.ipm.2020.102460.
[Details]
- 2020:
- 2019:
- 2018:
- 2017:
-
David Kotz and Travis Peters.
Challenges to ensuring human safety throughout the life-cycle of Smart Environments.
Proceedings of the ACM Workshop on the Internet of Safe Things (SafeThings), pages 1–7.
ACM, November 2017.
doi:10.1145/3137003.3137012.
[Details]
-
Aarathi Prasad, Xiaohui Liang, and David Kotz.
SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the ACM Workshop on Mobile Crowdsensing Systems and Applications (CrowdSense), pages 56–61.
ACM, November 2017.
doi:10.1145/3139243.3139245.
[Details]
-
Emily Greene.
ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control.
Technical Report number TR2017-827, Dartmouth College, Computer Science, Hanover, NH, July 2017.
Senior Honors Thesis.
[Details]
-
Aarathi Prasad and David Kotz.
ENACT: Encounter-based Architecture for Contact Tracing.
Proceedings of the ACM Workshop on Physical Analytics (WPA), pages 37–42.
ACM, June 2017.
doi:10.1145/3092305.3092310.
[Details]
- 2016:
-
David Kotz, Carl A. Gunter, Santosh Kumar, and Jonathan P. Weiner.
Privacy and Security in Mobile Health – A Research Agenda.
IEEE Computer, volume 49, number 6, pages 22–30.
IEEE, June 2016.
doi:10.1109/MC.2016.185.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Demo: Wanda, securely introducing mobile devices.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), page 113.
ACM, June 2016.
doi:10.1145/2938559.2938581.
[Details]
-
Aarathi Prasad.
Privacy-preserving controls for sharing mHealth data.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, May 2016.
Available as Dartmouth Computer Science Technical Report TR2016-794.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Wanda: securely introducing mobile devices.
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1–9.
IEEE, April 2016.
doi:10.1109/INFOCOM.2016.7524366.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Wanda: securely introducing mobile devices -- Extended version.
Technical Report number TR2016-789, Dartmouth Computer Science, February 2016.
Expanded version of the INFOCOM 2016 paper by the same title.
[Details]
- 2015:
-
David Kotz, Kevin Fu, Carl Gunter, and Avi Rubin.
Security for Mobile and Cloud Frontiers in Healthcare.
Communications of the ACM, volume 58, number 8, pages 21–23.
ACM, August 2015.
doi:10.1145/2790830.
[Details]
-
Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz.
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, volume 15, number 7, pages 15285–15310.
Open access, June 2015.
doi:10.3390/s150715285.
[Details]
- 2014:
-
Andrés Molina-Markham, Ronald Peterson, Joseph Skinner, Tianlong Yun, Bhargav Golla, Kevin Freeman, Travis Peters, Jacob Sorber, Ryan Halter, and David Kotz.
Amulet: A secure architecture for mHealth applications for low-power wearable devices.
Proceedings of the Workshop on Mobile Medical Applications-- Design and Development (WMMADD), pages 16–21.
ACM, November 2014.
doi:10.1145/2676431.2676432.
[Details]
-
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz.
Understanding User Privacy Preferences for mHealth Data Sharing.
MHealth: Multidisciplinary Verticals, chapter 30, pages 545–570.
Edited by Sasan Adibi.
Taylor & Francis (CRC Press), November 2014.
doi:10.1201/b17724-34.
ISBN13: 978-1-4822-1480-2.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Hide-n-Sense: preserving privacy efficiently in wireless mHealth.
Mobile Networks and Applications (MONET), volume 19, number 3, pages 331–344.
Springer-Verlag, June 2014.
doi:10.1007/s11036-013-0447-x.
Special issue on Wireless Technology for Pervasive Healthcare.
[Details]
-
Andrés Molina-Markham, Ronald A. Peterson, Joseph Skinner, Ryan J. Halter, Jacob Sorber, and David Kotz.
Poster: Enabling Computational Jewelry for mHealth Applications.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 374–375.
ACM, June 2014.
doi:10.1145/2594368.2601454.
[Details]
-
Aarathi Prasad, Xiaohui Liang, and David Kotz.
Poster: Balancing Disclosure and Utility of Personal Information.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 380–381.
ACM, June 2014.
doi:10.1145/2594368.2601448.
[Details]
- 2013:
-
Denise Anthony, Andrew Campbell, Thomas Candon, Andrew Gettinger, Carl A. Gunter, M. Eric Johnson, David Kotz, Lisa Marsch, Andrés Molina-Markham, Karen Page, and Sean Smith.
Securing Information Technology in Healthcare.
IEEE Security & Privacy, volume 11, number 6, pages 25–33.
IEEE, November 2013.
doi:10.1109/MSP.2013.104.
Invited paper.
[Details]
-
Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz.
Provenance framework for mHealth.
Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), pages 1–6.
IEEE, January 2013.
doi:10.1109/COMSNETS.2013.6465599.
[Details]
- 2012:
-
Sasikanth Avancha, Amit Baxi, and David Kotz.
Privacy in mobile technology for personal healthcare.
ACM Computing Surveys, volume 45, number 1, article 3, 54 pages.
ACM, November 2012.
doi:10.1145/2379776.2379779.
[Details]
-
Aarathi Prasad, Ronald Peterson, Jacob Sorber, and David Kotz.
A Provenance Framework for mHealth.
Proceedings of the Workshop for Mobile Systems, Applications, and Services for Healthcare (mHealthSys) Poster Track, article 9, 2 pages.
ACM, November 2012.
doi:10.1145/2396276.2396287.
[Details]
-
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz.
Understanding Sharing Preferences and Behavior for mHealth Devices.
Proceedings of the Workshop on Privacy in the Electronic Society (WPES), pages 117–128.
ACM, October 2012.
doi:10.1145/2381966.2381983.
[Details]
-
Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz.
An Amulet for trustworthy wearable mHealth.
Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), article 7, 6 pages.
ACM, February 2012.
doi:10.1145/2162081.2162092.
[Details]
-
Aarathi Prasad.
Exposing Privacy Concerns in mHealth Data Sharing.
Master's thesis, Dartmouth College Computer Science, Hanover, NH, February 2012.
Available as Technical Report TR2012-711.
[Details]
-
Phillip A. Fazio, Keren Tan, and David Kotz.
Effects of network trace sampling methods on privacy and utility metrics.
Proceedings of the Annual Workshop on Wireless Systems: Advanced Research and Development (WISARD), pages 1–8.
IEEE, January 2012.
doi:10.1109/COMSNETS.2012.6151387.
[Details]
- 2011:
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Adapt-lite: Privacy-aware, secure, and efficient mHealth sensing.
Proceedings of the Workshop on Privacy in the Electronic Society (WPES), pages 137–142.
ACM, October 2011.
doi:10.1145/2046556.2046574.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Hide-n-Sense: Privacy-aware secure mHealth sensing.
Technical Report number TR2011-702, Dartmouth Computer Science, September 2011.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Adaptive security and privacy for mHealth sensing.
Proceedings of the USENIX Workshop on Health Security (HealthSec), 5 pages.
USENIX Association, August 2011.
Short paper.
[Details]
-
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz.
Exposing privacy concerns in mHealth.
Proceedings of the USENIX Workshop on Health Security (HealthSec), 2 pages.
USENIX Association, August 2011.
Position paper.
[Details]
-
Keren Tan.
Large-scale Wireless Local-area Network Measurement and Privacy Analysis.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, August 2011.
Available as Dartmouth Computer Science Technical Report TR2011-703.
[Details]
-
Phil Fazio, Keren Tan, Jihwang Yeo, and David Kotz.
Short Paper: The NetSANI Framework for Analysis and Fine-tuning of Network Trace Sanitization.
Proceedings of the ACM Conference on Wireless Network Security (WiSec), pages 5–10.
ACM, June 2011.
doi:10.1145/1998412.1998416.
[Details]
-
Jacob Sorber, Minho Shin, Ron Peterson, and David Kotz.
Poster: Practical Trusted Computing for mHealth Sensing.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 405–406.
ACM, June 2011.
doi:10.1145/1999995.2000058.
[Details]
-
Phillip A. Fazio.
Effects of network trace sampling methods on privacy and utility metrics.
Technical Report number TR2011-697, Dartmouth College, Computer Science, Hanover, NH, June 2011.
Senior Honors Thesis.
[Details]
-
Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz.
Privacy analysis of user association logs in a large-scale wireless LAN.
Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) mini-conference, pages 31–35.
IEEE, April 2011.
doi:10.1109/INFCOM.2011.5935168.
[Details]
-
Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, and Nikos Triandopoulos.
AnonySense: A System for Anonymous Opportunistic Sensing.
Journal of Pervasive and Mobile Computing, volume 7, number 1, pages 16–30.
Elsevier, February 2011.
doi:10.1016/j.pmcj.2010.04.001.
[Details]
-
David Kotz.
A threat taxonomy for mHealth privacy.
Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), article 1, 6 pages.
IEEE, January 2011.
doi:10.1109/COMSNETS.2011.5716518.
[Details]
-
Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz.
Privacy Analysis of User Association Logs in a Large-scale Wireless LAN.
Technical Report number TR2011-679, Dartmouth Computer Science, January 2011.
[Details]
-
Keren Tan, Jihwang Yeo, Michael E. Locasto, and David Kotz.
Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization.
Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, chapter 5, pages 111–141.
Edited by Francesco Bonchi and Elena Ferrari.
Chapman and Hall/CRC Press, January 2011.
ISBN13: 9781439803653.
[Details]
- 2010:
-
Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz.
A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network.
Proceedings of the ACM MobiCom S3 workshop, pages 33–35.
ACM, September 2010.
doi:10.1145/1860039.1860050.
[Details]
-
Aarathi Prasad and David Kotz.
Can I access your Data? Privacy Management in mHealth.
Proceedings of the USENIX Workshop on Health Security (HealthSec), 2 pages.
USENIX Association, August 2010.
Position paper.
[Details]
-
Dan Peebles, Cory Cornelius, Apu Kapadia, David Kotz, Minho Shin, and Nikos Triandopoulos.
AnonyTL Specification.
Technical Report number TR2010-660, Dartmouth Computer Science, January 2010.
[Details]
- 2009:
-
David Kotz, Sasikanth Avancha, and Amit Baxi.
A privacy framework for mobile health and home-care systems.
Proceedings of the Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS), pages 1–12.
ACM, November 2009.
doi:10.1145/1655084.1655086.
[Details]
-
Jihwang Yeo, Keren Tan, and David Kotz.
User survey regarding the needs of network researchers in trace-anonymization tools.
Technical Report number TR2009-658, Dartmouth Computer Science, Hanover, NH, November 2009.
[Details]
-
Janani Sriram, Minho Shin, David Kotz, Anand Rajan, Manoj Sastry, and Mark Yarvis.
Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems.
Future of Trust in Computing, pages 129–142.
Edited by David Gawrock, Helmut Reimer, Ahmad-Reza Sadeghi, and Claire Vishik.
Vieweg+Teubner Verlag, July 2009.
doi:10.1007/978-3-8348-9324-6_14.
ISBN13: 978-3-8348-9324-6.
[Details]
-
Apu Kapadia, David Kotz, and Nikos Triandopoulos.
Opportunistic Sensing: Security Challenges for the New Paradigm.
Proceedings of the International Conference on COMmunication Systems and NETworkS (COMSNETS), 10 pages.
IEEE, January 2009.
doi:10.1109/COMSNETS.2009.4808850.
Invited paper.
[Details]
- 2008:
-
Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Nikos Triandopoulos.
AnonySense: Privacy-Aware People-Centric Sensing.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 211–224.
ACM, June 2008.
doi:10.1145/1378600.1378624.
[Details]
-
Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Patrick Tsang.
Poster Abstract: Reliable People-Centric Sensing with Unreliable Voluntary Carriers.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 1 page.
ACM, June 2008.
[Details]
-
Jeffrey Fielding.
Linkability in Activity Inference Data Sets.
Technical Report number TR2008-623, Dartmouth Computer Science, Hanover, NH, June 2008.
Available as Dartmouth Computer Science Technical Report TR2008-623.
Senior Honors Thesis. Advisors: Tanzeem Choudhury and David Kotz.
[Details]
-
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Dan Peebles, and David Kotz.
AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the International Conference on Pervasive Computing (Pervasive), volume 5013 in Lecture Notes in Computer Science, pages 280–297.
Springer-Verlag, May 2008.
doi:10.1007/978-3-540-79576-6_17.
[Details]
- 2007:
-
Denise Anthony, Tristan Henderson, and David Kotz.
Privacy in Location Aware Computing Environments.
IEEE Pervasive, volume 6, number 4, pages 64–72.
IEEE, October 2007.
doi:10.1109/MPRV.2007.83.
[Details]
-
Apu Kapadia, Tristan Henderson, Jeffrey Fielding, and David Kotz.
Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
Proceedings of the International Conference on Pervasive Computing (Pervasive), volume 4480 in Lecture Notes in Computer Science, pages 162–179.
Springer-Verlag, May 2007.
doi:10.1007/978-3-540-72037-9_10.
Honorable Mention for Best Paper.
[Details]
-
Peter Johnson, Apu Kapadia, David Kotz, and Nikos Triandopoulos.
People-Centric Urban Sensing: Security Challenges for the New Paradigm.
Technical Report number TR2007-586, Dartmouth Computer Science, February 2007.
[Details]
- 2004:
- 2002:
-
David Kotz, Robert Gray, and Daniela Rus.
Future Directions for Mobile-Agent Research.
IEEE Distributed Systems Online, volume 3, number 8, 6 pages.
IEEE, August 2002.
Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.
[Details]
-
David Kotz, Robert Gray, and Daniela Rus.
Future Directions for Mobile-Agent Research.
Technical Report number TR2002-415, Dartmouth Computer Science, January 2002.
Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.
[Details]
[Kotz research]