Sciweavers

408 search results - page 75 / 82
» Tailoring Privacy to Users' Needs
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
CHI
2010
ACM
14 years 2 months ago
Where there's a will there's a way: mobile media sharing in urban india
We present the results of a qualitative study of the sharing and consumption of entertainment media on low-cost mobile phones in urban India, a practice which has evolved into a v...
Thomas N. Smyth, Satish Kumar, Indrani Medhi, Kent...
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
14 years 2 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li
ITCC
2005
IEEE
14 years 1 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
SDMW
2004
Springer
14 years 1 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...