Sciweavers

96 search results - page 15 / 20
» Exploring Privacy Concerns about Personal Sensing
Sort
View
ICHIT
2009
Springer
15 years 6 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
WWW
2008
ACM
16 years 10 days ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
CHI
2009
ACM
16 years 7 days ago
UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits
The greatest contributor of CO2 emissions in the average American household is personal transportation. Because transportation is inherently a mobile activity, mobile devices are ...
Jon Froehlich, Tawanna Dillahunt, Predrag V. Klasn...
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 3 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
104
Voted
PET
2010
Springer
15 years 3 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...