A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...