Sciweavers

1906 search results - page 261 / 382
» Data Privacy
Sort
View
121
Voted
CHI
2008
ACM
16 years 4 months ago
Interactional empowerment
We propose that an interactional perspective on how emotion is constructed, shared and experienced, may be a good basis for designing affective interactional systems that do not i...
Anna Ståhl, Jarmo Laaksolahti, Kristina H&ou...
129
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Toward worm detection in online social networks
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit un...
Wei Xu, Fangfang Zhang, Sencun Zhu
128
Voted
CCS
2011
ACM
14 years 3 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
JSW
2007
124views more  JSW 2007»
15 years 3 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
154
Voted
CCS
2008
ACM
15 years 6 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß