Sciweavers

170 search results - page 18 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
CHI
2005
ACM
14 years 8 months ago
The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing
Developments in networked digital imaging promise to substantially affect the near-universal experience of personal photography. Designing technology for image capture and sharing...
Nancy A. Van House, Marc Davis, Morgan Ames, Megan...
CHI
2009
ACM
14 years 8 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CCS
2008
ACM
13 years 9 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
CN
1999
91views more  CN 1999»
13 years 7 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...