Sciweavers

21 search results - page 2 / 5
» Online subscriptions with anonymous access
Sort
View
NORDSEC
2009
Springer
13 years 12 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 3 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
13 years 10 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
13 years 11 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 5 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani