A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
We discuss the specific type of uncertainty deriving from the non-uniform trustworthiness of Semantic Web style metadata sources, arguing toward the feasibility of modal possibili...
Paolo Ceravolo, Ernesto Damiani, Cristiano Fugazza
Taking the temporal dimension into account in searching, i.e., using time of content creation as part of the search condition, is now gaining increasingly interest. However, in the...
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are...