Sciweavers

1351 search results - page 162 / 271
» Trust in Anonymity Networks
Sort
View
WWW
2010
ACM
14 years 5 months ago
The anatomy of a large-scale social search engine
We present Aardvark, a social search engine. With Aardvark, users ask a question, either by instant message, email, web input, text message, or voice. Aardvark then routes the que...
Damon Horowitz, Sepandar D. Kamvar
ETFA
2005
IEEE
14 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
CSE
2009
IEEE
14 years 2 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
IOT
2010
13 years 8 months ago
my2cents - Digitizing consumer opinions and comments about retail products
Consumers seek for trusted advice during buying decision. Brand owners and retailers invest large sums in marketing and market research, trying hard to find out what customers real...
Stephan Karpischek, Florian Michahelles
GLOBECOM
2010
IEEE
13 years 8 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...