Sciweavers

1606 search results - page 306 / 322
» Inferring Personal Information from Demand-Response Systems
Sort
View
CCS
2009
ACM
14 years 8 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CCS
2006
ACM
13 years 11 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
14 years 8 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
MHCI
2009
Springer
14 years 2 months ago
Fixed in time and "time in motion": mobility of vision through a SenseCam lens
SenseCam is an automatic wearable camera, often seen as a tool for the creation of digital memories. In this paper, we report findings from a field trial in which SenseCams were w...
Siân E. Lindley, Richard H. R. Harper, David...