Sciweavers

15379 search results - page 82 / 3076
» Protecting users from
Sort
View
WIDM
2005
ACM
14 years 1 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
FTDCS
1999
IEEE
14 years 1 days ago
Protecting Competitive Negotiation of Mobile Agents
The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common appli...
Hartmut Vogler, Axel Spriestersbach, Marie-Luise M...
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
ICONFERENCE
2011
13 years 2 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
ICMCS
2005
IEEE
131views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Attacks and Forensic Analysis for Multimedia Content Protection
Piracy is one of the biggest concerns in entertainment industry. Digital copies are perfect copies. An anti-piracy defense is to perform forensic analysis and identify who partici...
Hongxia Jin, Jeffery Lotspiech