In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
In this paper, the geometric interpolation of planar data points and boundary tangent directions by a cubic G2 Pythagorean-hodograph (PH) spline curve is studied. It is shown, that...
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...