The official PGP user's guide
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Practice-Oriented Provable-Security
ISW '97 Proceedings of the First International Workshop on Information Security
Achieving user privacy in mobile networks
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A User-Oriented Presence Synthesizing System for Facilitating On-Line Communication
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
Towards Trustworthy Spatial Messaging
Electronic Notes in Theoretical Computer Science (ENTCS)
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Analyzing Privacy Designs of Mobile Social Networking Applications
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Research on the Design Method of Mobile Social Network Services
ICIII '08 Proceedings of the 2008 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 02
Trust and security in spatial messaging: FoxyTag, the speed camera case study
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Using Mobile Phones to Nurture Social Networks
IEEE Pervasive Computing
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
The quest for personal control over mobile location privacy
IEEE Communications Magazine
Special issue on ubiquitous multimedia services
Information Systems Frontiers
Hi-index | 0.00 |
The key issue for any mobile application or service is the way it is delivered and experienced by users, who eventually may decide to keep it on their software portfolio or not. Without doubt, security and privacy have both a crucial role to play towards this goal. Very recently, Gartner has identified the top ten of consumer mobile applications that are expected to dominate the market in the near future. Among them one can earmark location-based services in number 2 and mobile instant messaging in number 9. This paper presents a novel application namely MILC that blends both features. That is, MILC offers users the ability to chat, interchange geographic co-ordinates and make Splashes in real-time. At present, several implementations provide these services separately or jointly, but none of them offers real security and preserves the privacy of the end-users at the same time. On the contrary, MILC provides an acceptable level of security by utilizing both asymmetric and symmetric cryptography, and most importantly, put the user in control of her own personal information and her private sphere. The analysis and our contribution are threefold starting from the theoretical background, continuing to the technical part, and providing an evaluation of the MILC system. We present and discuss several issues, including the different services that MILC supports, system architecture, protocols, security, privacy etc. Using a prototype implemented in Google's Android OS, we demonstrate that the proposed system is fast performing, secure, privacy-preserving and potentially extensible.