Sciweavers

15379 search results - page 17 / 3076
» Protecting users from
Sort
View
CSE
2009
IEEE
14 years 2 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
NOMS
2006
IEEE
14 years 1 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
SIGECOM
1999
ACM
125views ECommerce» more  SIGECOM 1999»
13 years 12 months ago
Privacy in e-commerce: examining user scenarios and privacy preferences
Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, b...
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reag...
ITICSE
2006
ACM
14 years 1 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 9 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...