Sciweavers

16 search results - page 3 / 4
» Information leaks in structured peer-to-peer anonymous commu...
Sort
View
HICSS
2006
IEEE
107views Biometrics» more  HICSS 2006»
15 years 3 months ago
Gaming Emergency Preparedness
This paper describes the design of a competitive game to support “offense” and “defense” teams as they develop and improve their scenarios and plans about possible crisis ...
Murray Turoff, Michael Chumer, Starr Roxanne Hiltz...
INFOCOM
2009
IEEE
15 years 4 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
DIM
2007
ACM
15 years 1 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
95
Voted
BTW
2003
Springer
103views Database» more  BTW 2003»
15 years 2 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
15 years 1 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin