Sciweavers

791 search results - page 80 / 159
» Users and Trust in Cyberspace
Sort
View
NCA
2003
IEEE
14 years 1 months ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny
CHI
2003
ACM
14 years 1 months ago
Prominence-interpretation theory: explaining how people assess credibility online
Four years of research has led to a theory that describes how people assess the credibility of Web sites. This theory proposes that users notice and interpret various Web site ele...
B. J. Fogg
CCR
1999
92views more  CCR 1999»
13 years 7 months ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
INTERACT
2003
13 years 9 months ago
Confidence Displays and Training in Recommender Systems
: Recommender systems help users sort through vast quantities of information. Sometimes, however, users do not know if they can trust the recommendations they receive. Adding a con...
Sean M. McNee, Shyong K. Lam, Catherine Guetzlaff,...
PET
2010
Springer
13 years 11 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg