Sciweavers

15379 search results - page 274 / 3076
» Protecting users from
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
COMPSAC
2009
IEEE
14 years 1 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
P2P
2010
IEEE
124views Communications» more  P2P 2010»
13 years 6 months ago
WhatsUp: News, From, For, Through, Everyone
—WHATSUP (WUP) is a new form of electronic news. It is personalized and decentralized. Users receive news and have the ability to express their interest in it. This opinion, in t...
A. Boutet, Davide Frey, Rachid Guerraoui, Anne-Mar...
HCI
2009
13 years 6 months ago
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems
Where the Object-Oriented paradigm set about abstracting objects, iented (AO) theory draws on Psychology to abstract mentalist notions like: beliefs, perceptions, goals, and intent...
Steve Goschnick
JUCS
2010
152views more  JUCS 2010»
13 years 6 months ago
Introducing Living Lab's Method as Knowledge Transfer from one Socio-Institutional Context to another: Evidence from Helsinki-Ta
: The present article aims to describe the Living Lab’s method as a method innovation in institutional activities and the problems of taking this innovation into use. Possibiliti...
Katri-Liis Lepik, Merle Krigul, Erik Terk