Sciweavers

1216 search results - page 191 / 244
» Online Prediction with Privacy
Sort
View
ISI
2003
Springer
14 years 2 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
SACMAT
2010
ACM
14 years 1 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
PERSUASIVE
2010
Springer
14 years 1 months ago
Happier Together: Integrating a Wellness Application into a Social Network Site
What are the benefits and drawbacks of integrating health and wellness interventions into existing online social network websites? In this paper, we report on a case study of deplo...
Sean A. Munson, Debra Lauterbach, Mark W. Newman, ...
NORDSEC
2009
Springer
14 years 1 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 1 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang