Sciweavers

230 search results - page 41 / 46
» On Anonymity with Identity Escrow
Sort
View
CSCW
2010
ACM
14 years 4 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
CCS
2009
ACM
14 years 2 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
CSE
2009
IEEE
14 years 2 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
SEMWEB
2009
Springer
14 years 2 months ago
XLWrap - Querying and Integrating Arbitrary Spreadsheets with SPARQL
In this paper a novel approach is presented for generating RDF graphs of arbitrary complexity from various spreadsheet layouts. Currently, none of the available spreadsheet-to-RDF ...
Andreas Langegger, Wolfram Wöß
LCN
2008
IEEE
14 years 2 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...