Sciweavers

76 search results - page 15 / 16
» Tokens for Anonymous Communications in the Internet
Sort
View
IH
2004
Springer
13 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
CORR
2000
Springer
83views Education» more  CORR 2000»
13 years 5 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
WWW
2003
ACM
14 years 6 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
CEAS
2008
Springer
13 years 7 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
13 years 9 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin