Sciweavers

30 search results - page 4 / 6
» Countering Terrorism through Information and Privacy Protect...
Sort
View
WWW
2010
ACM
13 years 7 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
ACSAC
2000
IEEE
13 years 11 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
LOCA
2005
Springer
14 years 26 days ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
IEEEIAS
2008
IEEE
14 years 1 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
WWW
2009
ACM
14 years 8 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...