Sciweavers

1305 search results - page 210 / 261
» Inferring Privacy Information from Social Networks
Sort
View
ACSAC
2003
IEEE
15 years 7 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 5 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ACSAC
2007
IEEE
15 years 8 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
ICWSM
2009
14 years 11 months ago
Gesundheit! Modeling Contagion through Facebook News Feed
Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
AAAI
2006
15 years 3 months ago
Bookmark Hierarchies and Collaborative Recommendation
GiveALink.org is a social bookmarking site where users may donate and view their personal bookmark files online securely. The bookmarks are analyzed to build a new generation of i...
Benjamin Markines, Lubomira Stoilova, Filippo Menc...