Sciweavers

1527 search results - page 247 / 306
» A Survey of Web Security
Sort
View
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
SOUPS
2009
ACM
15 years 5 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
EUROCRYPT
1999
Springer
15 years 3 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
MM
2009
ACM
156views Multimedia» more  MM 2009»
15 years 5 months ago
Understanding near-duplicate videos: a user-centric approach
Popular content in video sharing web sites (e.g., YouTube) is usually duplicated. Most scholars define near-duplicate video clips (NDVC) based on non-semantic features (e.g., di...
Mauro Cherubini, Rodrigo de Oliveira, Nuria Oliver
ICAIL
2007
ACM
15 years 3 months ago
Opinion mining in legal blogs
We perform a survey into the scope and utility of opinion mining in legal Weblogs (a.k.a. blawgs). The number of `blogs' in the legal domain is growing at a rapid pace and ma...
Jack G. Conrad, Frank Schilder