Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Many online networks are measured and studied via sampling techniques, which typically collect a relatively small fraction of nodes and their associated edges. Past work in this a...
Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almq...
In this paper, we describe the design of eyeView, a video conferencing system that uses participant looking behavior to determine the size of online video conferencing windows. Th...
Tracy Jenkin, Jesse McGeachie, David Fono, Roel Ve...
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...