Jeremy Martin

According to our database1, Jeremy Martin authored at least 15 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.
Proc. Priv. Enhancing Technol., 2021

Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My Network.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

2019
Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol.
Proc. Priv. Enhancing Technol., 2019

Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking.
CoRR, 2019

Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation.
CoRR, 2019

EUI-64 Considered Harmful.
CoRR, 2019

SEXTANT: A Computational Framework for Scalable and Efficient Correlation of Spatio-Temporal Trajectories.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Exploiting TLS Client Authentication for Widespread User Tracking.
Proc. Priv. Enhancing Technol., 2018

2017
A Study of MAC Address Randomization in Mobile Devices and When it Fails.
Proc. Priv. Enhancing Technol., 2017

How Much Privacy Does $3, 165 Buy You?
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A graph-theoretic approach to virtual access point correlation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Effects of channel environment on timing advance for mobile device positioning in long-term evolution networks.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

Decomposition of MAC address structure for granular device inference.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2013
Correlating GSM and 802.11 Hardware Identifiers.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2000
A Visual BSP Programming Environment for Distributed Computing.
Proceedings of the Network-Based Parallel Computing: Communication, 2000


  Loading...