Sciweavers

254 search results - page 46 / 51
» Analysis of privacy in online social networks of runet
Sort
View
CCS
2006
ACM
15 years 1 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ESORICS
2009
Springer
15 years 4 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
105
Voted
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
MM
2009
ACM
147views Multimedia» more  MM 2009»
15 years 2 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez
KAIS
2011
129views more  KAIS 2011»
14 years 4 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis