Digital Rights Management (DRM) technology ensures protection of rights on distributed music over the Internet. Existing DRM systems emphasize the protection on Businessto-Consume...
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
The detection of correlations between different features in a set of feature vectors is a very important data mining task because correlation indicates a dependency between the fe...