Sciweavers

344 search results - page 48 / 69
» trust 2009
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
CHI
2009
ACM
14 years 9 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CHI
2009
ACM
14 years 9 months ago
Resilience through technology adoption: merging the old and the new in Iraq
Little attention has been given to how citizens use technology to be resilient when their country is at war. We report on an ethnographic interview study of how technology was ado...
Gloria Mark, Ban Al-Ani, Bryan Semaan
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 9 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 9 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud