Sciweavers

471 search results - page 49 / 95
» Social applications: exploring a more secure framework
Sort
View
PET
2012
Springer
11 years 10 months ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
COLCOM
2007
IEEE
14 years 2 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
CHI
2005
ACM
13 years 9 months ago
Relescope: an experiment in accelerating relationships
Busy academics and professionals are being called upon to manage more and more relationships. Many details of collaboration are accessible in digital libraries and other repositor...
Stephen Farrell, Christopher S. Campbell, Suvda My...
PET
2007
Springer
14 years 1 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 6 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...