Sciweavers

53 search results - page 11 / 11
» FaceCloak: An Architecture for User Privacy on Social Networ...
Sort
View
WWW
2007
ACM
14 years 5 months ago
Communication as information-seeking: the case for mobile social software for developing regions
In this paper, we describe several findings from a multi-year, multi-method study of how information and communication technologies have been adopted and adapted in Central Asia. ...
Beth E. Kolko, Emma J. Rose, Erica J. Johnson
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
13 years 11 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
WWW
2010
ACM
13 years 12 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...