Using the Experience Sampling Method to Evaluate Ubicomp Applications
IEEE Pervasive Computing
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Pervasive and Mobile Computing
Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs
IEEE Transactions on Mobile Computing
MobiAd: private and scalable mobile advertising
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
Privacy-enhanced social-network routing
Computer Communications
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
Opportunistic networks have been the study of much research --- in particular on making end-to-end routing efficient. Users' privacy concerns, however, have not been the subject of much research. What privacy concerns might opportunistic network users have? Is it possible to build opportunistic networks that can mitigate users' privacy concerns while maintaining routing performance? Our work-to-date has tackled the problem of creating privacy-preserving routing protocols, with less emphasis on discovering users' actual privacy concerns. We summarise our current results, and describe a future experiment that we have planned to better understand users' privacy concerns.