Sciweavers

556 search results - page 92 / 112
» Link Privacy in Social Networks
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
IJMC
2010
139views more  IJMC 2010»
13 years 7 months ago
A realistic mobility model for wireless networks of scale-free node connectivity
: Recently, researchers have discovered that many of social, natural and biological networks are characterized by scale-free powerlaw connectivity distribution and a few densely po...
Sunho Lim, Chansu Yu, Chita R. Das
IDTRUST
2009
ACM
14 years 3 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
CCS
2006
ACM
14 years 14 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
WIKIS
2009
ACM
14 years 3 months ago
Bipartite networks of Wikipedia's articles and authors: a meso-level approach
This exploratory study investigates the bipartite network of articles linked by common editors in Wikipedia, ‘The Free Encyclopedia that Anyone Can Edit’. We use the articles ...
Rut Jesus, Martin Schwartz, Sune Lehmann