Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
Traditional techniques for balancing privacy and awareness in video media spaces, like blur filtration, have been proven to be ineffective for compromising home situations involvin...
We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on I...
Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. ...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...