On behalf of the organizing committee, we welcome you to the Workshop on Privacy-Aware Mobile Computing (PAMCO 2016), held in association with the 17th International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2016) held in Paderborn, Germany. PAMCO was created to bring together researchers from privacy, mobile computing, cloud, database, and security communities to discuss topics related to privacy protection on mobile platforms.
Proceeding Downloads
Android privacy C(R)ache: reading your external storage and sensors for fun and profit
Android's permission system empowers informed privacy decisions when installing third-party applications. However, examining the access permissions is not enough to assess privacy exposure; even seemingly harmless applications can severely expose user ...
Light-SPD: a platform to prototype secure mobile applications
Securely storing sensitive personal data is critical for protecting privacy. Currently, many persons use smartphones to store their private data. However, smartphones suffer from many security issues. To overcome this situation, the PCAS project is ...
Human recognizer: an ECG based live biometric fingerprint
As wearable devices gain widespread acceptance among the general population, there is a crying need to ensure that relevant privacy and security vulnerabilities are to minimize the hazards. Biometrics become very important in our daily lives due to its ...
CREDROID: Android malware detection by network traffic analysis
Android, one of the most popular open source mobile operating system, is facing a lot of security issues. Being used by users with varying degrees of awareness complicates the problem further. Most of the security problems are due to maliciousness of ...
Customized privacy preserving for classification based applications
The rise of sensor-equipped smart phones has enabled a variety of classification based applications that provide personalized services based on user data extracted from sensor readings. However, malicious applications aggressively collect sensitive ...
A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI
With the popularity of cloud computing, database outsourcing has been adopted by many companies. However, database owners may not 100% trust their database service providers. As a result, database privacy becomes a key issue for protecting data from the ...
Efficient privacy-preserving schemes for dot-product computation in mobile computing
Many applications of mobile computing require the computation of dot-product of two vectors. For examples, the dot-product of an individual's genome data and the gene biomarkers of a health center can help detect diseases in m-Health, and that of the ...
- Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing