Sciweavers

127 search results - page 26 / 26
» Web Page Filtering and Re-Authoring for Mobile Users
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 11 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
SENSYS
2010
ACM
13 years 3 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh