Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Jiang, Y., Baee, M. A. R., Simpson, L. R., Gauravaram, P., Pieprzyk, J., Zia, T. A., Zhao, Z., & Le, Z. Cryptogr., 8(1):5, 2024. Paper doi bibtex @article{DBLP:journals/cryptography/JiangBSGPZZL24,
author = {Yinhao Jiang and
Mir Ali Rezazadeh Baee and
Leonie Ruth Simpson and
Praveen Gauravaram and
Josef Pieprzyk and
Tanveer A. Zia and
Zhen Zhao and
Zung Le},
title = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and
Countermeasures},
journal = {Cryptogr.},
volume = {8},
number = {1},
pages = {5},
year = {2024},
url = {https://doi.org/10.3390/cryptography8010005},
doi = {10.3390/CRYPTOGRAPHY8010005},
timestamp = {Mon, 15 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"tbFFv5WuvH4yY8oi9","bibbaseid":"jiang-baee-simpson-gauravaram-pieprzyk-zia-zhao-le-pervasiveuserdatacollectionfromcyberspaceprivacyconcernsandcountermeasures-2024","author_short":["Jiang, Y.","Baee, M. A. R.","Simpson, L. R.","Gauravaram, P.","Pieprzyk, J.","Zia, T. A.","Zhao, Z.","Le, Z."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Yinhao"],"propositions":[],"lastnames":["Jiang"],"suffixes":[]},{"firstnames":["Mir","Ali","Rezazadeh"],"propositions":[],"lastnames":["Baee"],"suffixes":[]},{"firstnames":["Leonie","Ruth"],"propositions":[],"lastnames":["Simpson"],"suffixes":[]},{"firstnames":["Praveen"],"propositions":[],"lastnames":["Gauravaram"],"suffixes":[]},{"firstnames":["Josef"],"propositions":[],"lastnames":["Pieprzyk"],"suffixes":[]},{"firstnames":["Tanveer","A."],"propositions":[],"lastnames":["Zia"],"suffixes":[]},{"firstnames":["Zhen"],"propositions":[],"lastnames":["Zhao"],"suffixes":[]},{"firstnames":["Zung"],"propositions":[],"lastnames":["Le"],"suffixes":[]}],"title":"Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures","journal":"Cryptogr.","volume":"8","number":"1","pages":"5","year":"2024","url":"https://doi.org/10.3390/cryptography8010005","doi":"10.3390/CRYPTOGRAPHY8010005","timestamp":"Mon, 15 Apr 2024 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/cryptography/JiangBSGPZZL24,\n author = {Yinhao Jiang and\n Mir Ali Rezazadeh Baee and\n Leonie Ruth Simpson and\n Praveen Gauravaram and\n Josef Pieprzyk and\n Tanveer A. Zia and\n Zhen Zhao and\n Zung Le},\n title = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and\n Countermeasures},\n journal = {Cryptogr.},\n volume = {8},\n number = {1},\n pages = {5},\n year = {2024},\n url = {https://doi.org/10.3390/cryptography8010005},\n doi = {10.3390/CRYPTOGRAPHY8010005},\n timestamp = {Mon, 15 Apr 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jiang, Y.","Baee, M. A. R.","Simpson, L. R.","Gauravaram, P.","Pieprzyk, J.","Zia, T. A.","Zhao, Z.","Le, Z."],"key":"DBLP:journals/cryptography/JiangBSGPZZL24","id":"DBLP:journals/cryptography/JiangBSGPZZL24","bibbaseid":"jiang-baee-simpson-gauravaram-pieprzyk-zia-zhao-le-pervasiveuserdatacollectionfromcyberspaceprivacyconcernsandcountermeasures-2024","role":"author","urls":{"Paper":"https://doi.org/10.3390/cryptography8010005"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/164/4873.bib","dataSources":["QnCLXdFxJhT94HL3j"],"keywords":[],"search_terms":["pervasive","user","data","collection","cyberspace","privacy","concerns","countermeasures","jiang","baee","simpson","gauravaram","pieprzyk","zia","zhao","le"],"title":"Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures","year":2024}