Learn More
Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as(More)
The increasing popularity of location based social services such as Facebook Places, Foursquare and Google Latitude, solicits a new trend in fusing social networking with real world sensing. The availability of a wide range of sensing technologies in our everyday environment presents an opportunity to further enrich social networking systems with(More)
—The Internet of Things (IoT) aims at connecting billions of devices in an Internet-like structure. This gigantic information exchange enables new opportunities and new forms of interactions among things and people. A crucial enabler of robust applications and easy smart objects' deployment is the availability of mechanisms that minimize (ideally, cancel)(More)
Real-time tracking of massive numbers of mobile devices, either carried by humans or embedded into vehicles, is a challenging problem whose solution may pave the way for a large set of valuable applications, ranging from social networking to ambient intelligence. A centralized approach, i.e. a server collects position data and provides it to interested(More)
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as " Cross-Network Effective Traffic Alert Dissemination " (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, with direct(More)
—The widespread use of tracking and localization systems may be hindered by centralized server platforms whose performance can hardly scale up to the needs of very large numbers of concurrent mobile users. In this paper we introduce GeoKad, a peer-to-peer lo-calization protocol based on the new concept of Distributed Geographic Table, that allows to(More)
  • Simone Cirani, Marco Picone, Pietro Gonizzi, Luca Veltri, Gianluigi Ferrari
  • 2014
— Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as(More)
—In this paper, we analyze the performance of a peer-to-peer (P2P) distributed storage architecture based on a layered overlay scheme, where some nodes provide their disk capacities for hosting data fragments generated by other active users. This system has been introduced and studied, by means of simulations, in a previous paper, where the use of(More)