2020
DOI: 10.1007/978-3-030-50323-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Capturing Privacy-Preserving User Contexts with IndoorHash

Abstract: IoT devices are ubiquitous and widely adopted by end-users to gather personal and environmental data that often need to be put into context in order to gain insights. In particular, location is often a critical context information that is required by third parties in order to analyse such data at scale. However, sharing this information is i) sensitive for the user privacy and ii) hard to capture when considering indoor environments. This paper therefore addresses the challenge of producing a new location hash… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 39 publications
(47 reference statements)
0
2
0
Order By: Relevance
“…Using the above mapping set, the conversion from the index of the range to host addresses and ports can be achieved according to equations ( 5) and (6). We use this conversion to find the IP and port of the ith scan task.…”
Section: Scanning Proxy Subsystem (Sps)mentioning
confidence: 99%
See 1 more Smart Citation
“…Using the above mapping set, the conversion from the index of the range to host addresses and ports can be achieved according to equations ( 5) and (6). We use this conversion to find the IP and port of the ith scan task.…”
Section: Scanning Proxy Subsystem (Sps)mentioning
confidence: 99%
“…Even though some enterprises have discovered vulnerabilities and released repair patches, many users still do not update, leading to potential security threats and providing attackers with access to attacks. At the same time, many web apps and services are installed on the devices hosting a web client and providing the interface for user control with open ports, where security and privacy are the critical issues [5,6]. Censorship needs to know these security risks, that is, to count and supervise the service information in a large-scale network.…”
Section: Introductionmentioning
confidence: 99%