Sciweavers

5324 search results - page 1024 / 1065
» Internet Security Protocols
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 1 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
SOUPS
2006
ACM
14 years 1 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
MM
2004
ACM
136views Multimedia» more  MM 2004»
14 years 1 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 1 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
« Prev « First page 1024 / 1065 Last » Next »