Sciweavers

791 search results - page 101 / 159
» Users and Trust in Cyberspace
Sort
View
WEBDB
2007
Springer
85views Database» more  WEBDB 2007»
14 years 1 months ago
Corroborating Answers from Multiple Web Sources
The Internet has changed the way people look for information. Users now expect the answers to their questions to be available through a simple web search. Web search engines are i...
Minji Wu, Amélie Marian
ACSAC
2006
IEEE
14 years 1 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
COMPSAC
2009
IEEE
14 years 12 days ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
MAGS
2006
79views more  MAGS 2006»
13 years 7 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
TSMC
2008
109views more  TSMC 2008»
13 years 7 months ago
Providing Justifications in Recommender Systems
Abstract--Recommender systems are gaining widespread acceptance in e-commerce applications to confront the "information overload" problem. Providing justification to a re...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...