Sciweavers

26 search results - page 2 / 6
» Share your data, Keep your secrets
Sort
View
CHI
2009
ACM
14 years 5 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
HUC
2007
Springer
13 years 11 months ago
Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments
Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share...
A. J. Bernheim Brush, Kori M. Inkpen
SISW
2005
IEEE
13 years 10 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
CSIE
2009
IEEE
13 years 8 months ago
Accessing Password-Protected Resources without the Password
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a t...
Andreas Pashalidis
WWW
2009
ACM
14 years 5 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...