Learn More
In this paper it is described how can a social network, like Facebook, be exploited and converted into an attack platform, in order to gain some sensitive data, which can complete a perfect attacking profile against a user. More specifically, we created a Facebook application for demonstration purposes that on the surface is a simple application, but on the(More)
The unprecedented urbanization of the past decades has not only led to the introduction of the concept of smart cities, but has simultaneously made them a necessity. By converting our cities into smart ones, we enable future generations to live in a friendly and sustainable environment. Within smart cities, the wide deployment of sensors allows the(More)
—Automatic recommender systems have become a cornerstone of e-commerce, especially after the great welcome of Web 2.0 based on participation and interaction of Internet users. Collaborative Filtering (CF) is a recommender system that is becoming increasingly relevant for the industry due to the growth of the Internet, which has made it much more difficult(More)
When using cryptography, there is frequently the misconception that if the keys are properly stored and are not given away, then the user is safe, if he uses a strong encryption algorithm. SETUPs exploit this common misconception, be embedding secret trapdoors in the key creation procedure of public key algorithms. The essential part of a SETUP, is to(More)