Sciweavers

3395 search results - page 116 / 679
» Computational Differential Privacy
Sort
View
CSE
2009
IEEE
15 years 7 months ago
Privacy in Online Social Networking at Workplace
—Employees using social network sites (SNS) at workplace is a fact. As companies are further embracing social media, how if at all does this practice affect the work dynamics? Wh...
Yang Wang 0005, Alfred Kobsa
94
Voted
CSE
2009
IEEE
15 years 7 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
118
Voted
ESAS
2007
Springer
15 years 7 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
93
Voted
HUC
2007
Springer
15 years 7 months ago
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM
We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on I...
Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. ...
ICDCSW
2005
IEEE
15 years 6 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong