Sciweavers

2492 search results - page 425 / 499
» False-Name-Proofness in Social Networks
Sort
View
ASIACRYPT
2010
Springer
14 years 12 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
CASCON
2010
174views Education» more  CASCON 2010»
14 years 12 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
GLOBECOM
2010
IEEE
14 years 12 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
SOCIALCOM
2010
14 years 11 months ago
Friendfeed Breaking News: Death of a Public Figure
Abstract--Microblogging sites allow users to post short messages online, offering a reliable way to communicate and to spread information quickly and efficiently; moreover, they ca...
Matteo Magnani, Danilo Montesi, Luca Rossi
ICMCS
2009
IEEE
170views Multimedia» more  ICMCS 2009»
14 years 11 months ago
Travel scrapbooks: Creating rich visual travel narratives
The convergence of the Internet and ubiquitous technologies offers an unprecedented level of convenience for information collection, accessing, and sharing through mobile devices ...
Vidya Setlur, Agathe Battestini, Xianghua Ding