Sciweavers

53 search results - page 9 / 11
» Generating a privacy footprint on the internet
Sort
View
GD
2008
Springer
14 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
CCS
2009
ACM
15 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
15 years 3 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
AH
2006
Springer
15 years 3 months ago
Considering Additional Adaptation Concerns in the Design of Web Applications
The design of Web applications traditionally relies heavily on the navigation design. The Web as it evolves now brings additional design concerns, such as omni-presence, device-dep...
Sven Casteleyn, Zoltán Fiala, Geert-Jan Hou...
ISI
2005
Springer
15 years 3 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...