Sciweavers

6696 search results - page 31 / 1340
» Securing social networks
Sort
View
CHI
2003
ACM
14 years 9 months ago
Recommending collaboration with social networks: a comparative evaluation
Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks prov...
David W. McDonald
CCS
2008
ACM
13 years 10 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
ICWSM
2008
13 years 10 months ago
Visualization of Social Interactions in Facebook
With the popularity of social networks such as Facebook, we have greatly extended our social interactions from the physical into the digital. With social networks we have an incre...
Takashi Okamoto, Kyle Buza
CANS
2009
Springer
169views Cryptology» more  CANS 2009»
14 years 3 months ago
Privacy-Preserving Relationship Path Discovery in Social Networks
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Pa...
ACMIDC
2009
14 years 22 days ago
Petimo: safe social networking robot for children
"Petimo" is an interactive robotic toy designed to protect children from potential risks in social networks and the virtual world and helps them to make a safely connect...
Adrian David Cheok, Owen Noel Newton Fernando, Cha...