A Study on Contact Tracing Apps for Covid-19: Privacy and Security Perspective
Citations
3 citations
3 citations
References
1,047 citations
"A Study on Contact Tracing Apps for..." refers methods in this paper
...This protocol ensures that the registration procedure for the user's application assign a unique identifier for the device with no Personally identifiable information recording (Felt et al., 2012)....
[...]
510 citations
"A Study on Contact Tracing Apps for..." refers background in this paper
...org Figure 1 Architecture of Centralised Contact Tracing App (Ahmed et al., 2020)...
[...]
...Rather than all chirps, uploading seeds reduces latency and increases the usage of bandwidth (Ahmed et al., 2020)....
[...]
...• Hybrid Contact Tracing App Architecture The database handles all the difficult operations in the centralized framework, e.g. TempID analyses, encoding, decoding, risk assessment, and at-risk contact alert notifications....
[...]
...The purpose for an intrusion according to (Ahmed et al., 2020) is differs and therefore can vary from political, religious, to monetary....
[...]
...344 http://www.webology.org • Decentralized Contact Tracing App Architecture Unlike centralized architecture, decentralized framework does not require users of the app to pre-register before they can use the app, thereby preventing any personally identifiable information being stored within the database....
[...]
510 citations
344 citations
"A Study on Contact Tracing Apps for..." refers methods in this paper
...To this end, we apply the ideas used by (Cho et al., 2020) since these notions tend to always be a common to every techniques and applicable to development of methods for contact tracing (Spensky et al., 2016)....
[...]