skip to main content
10.1145/2940343acmconferencesBook PagePublication PagesmobihocConference Proceedingsconference-collections
PAMCO '16: Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MobiHoc'16: The Seventeenth ACM International Symposium on Mobile Ad Hoc Networking and Computing Paderborn Germany July 5 - 8, 2016
ISBN:
978-1-4503-4346-6
Published:
05 July 2016
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 23 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

On behalf of the organizing committee, we welcome you to the Workshop on Privacy-Aware Mobile Computing (PAMCO 2016), held in association with the 17th International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2016) held in Paderborn, Germany. PAMCO was created to bring together researchers from privacy, mobile computing, cloud, database, and security communities to discuss topics related to privacy protection on mobile platforms.

Skip Table Of Content Section
SESSION: Mobile platform security and privacy
research-article
Android privacy C(R)ache: reading your external storage and sensors for fun and profit

Android's permission system empowers informed privacy decisions when installing third-party applications. However, examining the access permissions is not enough to assess privacy exposure; even seemingly harmless applications can severely expose user ...

research-article
Light-SPD: a platform to prototype secure mobile applications

Securely storing sensitive personal data is critical for protecting privacy. Currently, many persons use smartphones to store their private data. However, smartphones suffer from many security issues. To overcome this situation, the PCAS project is ...

research-article
Human recognizer: an ECG based live biometric fingerprint

As wearable devices gain widespread acceptance among the general population, there is a crying need to ensure that relevant privacy and security vulnerabilities are to minimize the hazards. Biometrics become very important in our daily lives due to its ...

research-article
CREDROID: Android malware detection by network traffic analysis

Android, one of the most popular open source mobile operating system, is facing a lot of security issues. Being used by users with varying degrees of awareness complicates the problem further. Most of the security problems are due to maliciousness of ...

SESSION: Protocol and frameworks for privacy
research-article
Public Access
Customized privacy preserving for classification based applications

The rise of sensor-equipped smart phones has enabled a variety of classification based applications that provide personalized services based on user data extracted from sensor readings. However, malicious applications aggressively collect sensitive ...

research-article
A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI

With the popularity of cloud computing, database outsourcing has been adopted by many companies. However, database owners may not 100% trust their database service providers. As a result, database privacy becomes a key issue for protecting data from the ...

research-article
Efficient privacy-preserving schemes for dot-product computation in mobile computing

Many applications of mobile computing require the computation of dot-product of two vectors. For examples, the dot-product of an individual's genome data and the gene biomarkers of a health center can help detect diseases in m-Health, and that of the ...

Contributors
  • Shandong University
  • National University of Singapore
  1. Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing

      Recommendations