Sciweavers

451 search results - page 84 / 91
» What Is a Conversation Policy
Sort
View
IEEECIT
2010
IEEE
13 years 8 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IJACDT
2011
125views more  IJACDT 2011»
13 years 1 months ago
Becoming Creative through Self Observation: A (Second Order) Cybernetic Learning Strategy for the Metaverse
This study wishes to describe some of the key components of an art educational domain entitled ground<c>, which is being developed specifically for three dimensional online ...
Elif E. Ayiter
WWW
2008
ACM
14 years 10 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
CHI
2004
ACM
14 years 10 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters