Sciweavers

30 search results - page 2 / 6
» Countering Terrorism through Information and Privacy Protect...
Sort
View
IEPOL
2006
57views more  IEPOL 2006»
13 years 5 months ago
Multi-level markets and incentives for information goods
The free-rider phenomenon which impedes the marketing of information goods is conventionally countered by copyright protection regulations and technology. Alternative ways to mark...
Andreas U. Schmidt
SOUPS
2005
ACM
13 years 11 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
WWW
2006
ACM
14 years 6 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
HOTOS
2003
IEEE
13 years 10 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
CSREASAM
2006
13 years 7 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai