Sciweavers

2492 search results - page 22 / 499
» False-Name-Proofness in Social Networks
Sort
View
PODC
2011
ACM
12 years 10 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
SIGMOD
2012
ACM
191views Database» more  SIGMOD 2012»
11 years 10 months ago
Sindbad: a location-based social networking system
This demo presents Sindbad; a location-based social networking system. Sindbad supports three new services beyond traditional social networking services, namely, location-aware ne...
Mohamed Sarwat, Jie Bao 0003, Ahmed Eldawy, Justin...
PERCOM
2010
ACM
13 years 6 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
CDC
2010
IEEE
123views Control Systems» more  CDC 2010»
13 years 2 months ago
Implicit learning for explicit discount targeting in Online Social networks
Online Social networks are increasingly being seen as a means of obtaining awareness of user preferences. Such awareness could be used to target goods and services at them. We cons...
Srinivas Shakkottai, Lei Ying, Sankalp Sah
JITECH
2010
117views more  JITECH 2010»
13 years 6 months ago
Understanding information disclosure behaviour in Australian Facebook users
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable