Sciweavers

2656 search results - page 41 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
PET
2010
Springer
13 years 11 months ago
How to Share Your Favourite Search Results while Preserving Privacy and Quality
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
CCS
2009
ACM
14 years 2 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
IEEEARES
2008
IEEE
14 years 2 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
ASSETS
2009
ACM
14 years 12 days ago
Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators
The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present ...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Christia...
CHI
2010
ACM
14 years 17 days ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford