Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
This paper explores a new approach to community building. It is based on the concept of salutogenesis; a proactive approach to community health which seeks preventative measures i...
Studying the evolution of long lived processes such as the development history of a software system or the publication history of a research community, requires the analysis of a ...