Sciweavers

170 search results - page 28 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
ACSAC
2003
IEEE
14 years 27 days ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
HICSS
2008
IEEE
139views Biometrics» more  HICSS 2008»
14 years 2 months ago
Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities
This paper builds upon action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing...
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera...
INFOCOM
2010
IEEE
13 years 6 months ago
On the Viability of Paris Metro Pricing for Communication and Service Networks
—Paris Metro Pricing (PMP) is a simple multi-class flat-rate pricing scheme already practiced by transport systems, specifically by the Paris Metro at one time. The name is coi...
Chi-Kin Chau, Qian Wang, Dah-Ming Chiu
BCSHCI
2007
13 years 9 months ago
Designing for photolurking
This paper describes our early work on design and development to support photolurking. Photolurking is browsing and looking at people’s photographs without participating in disc...
Haliyana Khalid, Alan J. Dix