Sciweavers

15379 search results - page 160 / 3076
» Protecting users from
Sort
View
IJCAI
2007
13 years 9 months ago
Inferring Long-term User Properties Based on Users' Location History
Recent development of location technologies enables us to obtain the location history of users. This paper proposes a new method to infer users’ longterm properties from their r...
Yutaka Matsuo, Naoaki Okazaki, Kiyoshi Izumi, Yosh...
ASIACRYPT
2001
Springer
13 years 11 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
EDBTW
2010
Springer
14 years 2 months ago
Analysis of social networking privacy policies
As the use of social networks becomes more widespread and commonplace, users are beginning to question how their privacy is protected by social networks. In this paper, we review ...
Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Ba...
ISPA
2004
Springer
14 years 1 months ago
Building Infrastructure Support for Ubiquitous Context-Aware Systems
Abstract. Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet prac...
Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gus...
EOR
2006
82views more  EOR 2006»
13 years 8 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford